User`s guide

List of Tables
NWA3550 User’s Guide
27
List of Tables
Table 1 The Status Screen .................................................................................................................... 45
Table 2 Tutorial: Example Information ................................................................................................... 53
Table 3 Tutorial: Rogue AP Example Information .................................................................................. 63
Table 4 Tutorial: Friendly AP Information ............................................................................................... 65
Table 5 Tutorial: SSID Profile Security Settings ..................................................................................... 70
Table 6 Tutorial: Example Network MAC Addresses ............................................................................. 71
Table 7 Tutorial: Example User MAC Addresses ................................................................................... 71
Table 8 Tutorial: SERVER_2 Network Information ................................................................................74
Table 9 System > General ..................................................................................................................... 79
Table 10 Password ................................................................................................................................ 81
Table 11 SYSTEM > Time Setting ......................................................................................................... 83
Table 12 Default Time Servers .............................................................................................................. 84
Table 13 WMM QoS Priorities ............................................................................................................... 87
Table 14 Typical Packet Sizes ............................................................................................................... 87
Table 15 Automatic Traffic Classifier Priorities ...................................................................................... 87
Table 16 ATC + WMM Priority Assignment (LAN to WLAN) .................................................................. 88
Table 17 ATC + WMM Priority Assignment (WLAN to LAN) .................................................................. 88
Table 18 ToS and IEEE 802.1d to WMM QoS Priority Level Mapping .................................................. 90
Table 19 STP Path Costs ...................................................................................................................... 90
Table 20 STP Port States ...................................................................................................................... 91
Table 21 Wireless: Access Point ........................................................................................................... 93
Table 22 Wireless: Bridge/Repeater ...................................................................................................... 96
Table 23 Types of Encryption for Each Type of Authentication ........................................................... 102
Table 24 Security Modes ..................................................................................................................... 103
Table 25 WIRELESS > Security .......................................................................................................... 104
Table 26 Security: WEP ....................................................................................................................... 105
Table 27 Security: 802.1x Only ............................................................................................................ 106
Table 28 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................. 107
Table 29 Security: WPA ....................................................................................................................... 108
Table 30 Security: WPA2 or WPA2-MIX .............................................................................................. 109
Table 31 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................110
Table 32 RADIUS .................................................................................................................................112
Table 33 Wireless: Multiple BSS ...........................................................................................................115
Table 34 SSID .......................................................................................................................................118
Table 35 Configuring SSID ...................................................................................................................119
Table 36 WIRELESS > Layer-2 Isolation ............................................................................................. 123
Table 37 WIRELESS > Layer-2 Isolation Configuration ...................................................................... 124
Table 38 WIRELESS > MAC Filter ...................................................................................................... 127