Specifications

Index-7
password, global 18-3, 18-4
server configuration 18-3
server group configuration 18-6
server group, configuration
scenario 18-9
server groups, displaying 17-60
timers 18-6
unresponsive RADIUS servers,
scenario 3-13
usage guidelines B-1, C-1
RADIUS attributes
accounting, supported C-2
Enterasys specific C-5
global attributes, resetting 18-4
RFCs for C-1
standard and extended C-2
value characteristics C-1
VLAN assignment 4-15
VSAs C-5
RADIUS proxy 17-37
range operator in security ACLs 15-7
RAS (RoamAbout Switch)
fixing common setup problems A-2
monitoring performance A-4
troubleshooting A-1
RAS ports
network 4-1
wired authentication 4-1, 4-3
RASM
keys and certificates requirement
16-1
RBT-1602
dual homing F-1
reauthentication
802.1X client 19-5
interval 19-6
number of attempts 19-6
reauthorization attempts 19-6
receivers, multicast 14-7
redundancy
port groups 4-11, 4-12
RBT-1602 links F-1
rekeying WEP 19-4
remote monitoring A-15
Reply-Message attribute C-2
Request-To-Send threshold 9-45
reset cycle A-3
RF Auto-Tuning 11-1
locking down settings 11-8
RF detection 22-1
RFC 2865, RADIUS C-1
RFC 2866, RADIUS accounting C-1
RFC 2868, RADIUS tunnels C-1
RFC 2869, Acct-Input-Gigawords
attribute C-4
RFC 2869, RADIUS extensions C-1
RFC 3164, syslog servers A-4
roaming
accounting records 17-57
affinity 4-16
affinity, configuring 4-18
monitoring roaming clients 7-9
required conditions for 7-8
timers in 7-9
user sessions 7-8
See also Mobility Domain
roaming stations 7-6
roaming VLANs 7-6
robustness value 14-2
configuring 14-3
rogue access points
detecting 22-2
rogue classification 22-2
rogue detection 22-1
active scan 22-11
AP signatures 22-12
attack list 22-9
classification 22-2
client black list 22-8
displaying information 22-17
feature summary 22-5
ignore list 22-10
logging 22-12
permitted SSID list 22-7
permitted vendor list 22-6
scans 22-4
SNMP notifications 22-12
rogue detection lists 22-2
configuring 22-6
rolling WEP keys 19-4
rotating WEP keys 19-4
router discovery. See router solicitation
router solicitation 14-3
routers, multicast 14-7
routes 5-6
default 5-8
displaying 5-7
static 5-8
tracing 5-29
RSA Data Security, Inc. 16-4
RSN
overview 10-12
RTS threshold 9-45
running configuration
displaying 23-9
saving 23-11
S
safety notices, explanations of iii
saving the configuration 3-10, 23-11
scenarios
AAA for administrators 3-11
AAA for local users 3-11
IP interfaces and services 5-30
keys and certificates 16-11
local authentication 3-11
local authentication, console users
3-11
local override and backup
authentication 3-12
location policy 17-68
Mobility Domain 7-10
Network Domain 8-9
overriding VLAN assignment 17-68
PEAP-MS-CHAP-V2 configuration
17-67
PEAP-MS-CHAP-V2 offload
authentication 17-67
PEAP-MS-CHAP-V2 with pass-
through authentication
17-68
port and VLAN configuration 4-24
problems in configuration order
17-62
RADIUS and server group
configuration 18-9
RADIUS authentication for Telnet
users 3-11
RADIUS pass-through
authentication
configuration 17-66
security ACL configuration 15-29
STP configuration 13-15
unresponsive RADIUS servers
3-13
Secure Sockets Layer protocol (SSL),
management ports D-1
security
AP (Access Point) 9-35
security ACLs
ACEs 15-2
adding an ACE 15-16
assigning to user 17-48
authorization attributes 17-48
clearing ACLs from the edit buffer
15-19
clearing maps 15-15
committed, viewing 15-10
compared to the location policy
17-52
configuration scenario 15-29
deleting 15-12
displaying details in 15-11
displaying maps for 15-15
hits 15-11
ICMP 15-6
IP 15-4
locating ACEs 15-17
mapping 15-14
mapping to users
15-13, 17-48
modifying 15-16