Event Logs - 3Com 3CRWE876075 User Manual

Wireless 8760 dual-radio 11a/b/g poe access point
Hide thumbs Also See for 3CRWE876075:
Table of Contents

Advertisement

system" and "shared key." Open-system authentication accepts any client
attempting to connect to the access point without verifying its identity. The
shared-key approach uses Wired Equivalent Privacy (WEP) to verify client
identity by distributing a shared key to stations before attempting
authentication.
Associated: Shows if the station has been successfully associated with the
access point. Once authentication is completed, stations can associate with
the current access point, or reassociate with a new access point. The
association procedure allows the wireless system to track the location of each
mobile client, and ensure that frames destined for each client are forwarded to
the appropriate access point.
Forwarding Allowed: Shows if the station has passed 802.1X authentication
and is now allowed to forward traffic to the access point.
Key Type – Displays one of the following:
• WEP Disabled – The client is not using Wired Equivalent Privacy (WEP)
encryption keys.
• Dynamic – The client is using Wi-Fi Protected Access (802.1X or pre-shared
key mode) or using 802.1X authentication with dynamic keying.
• Static – The client is using static WEP keys for encryption.

Event Logs

The Event Logs window shows the log messages generated by the access point
and stored in memory.
Figure 45 Event Logs
The Event Logs table displays the following information:
Log Time: The time the log message was generated.
Event Level: The logging level associated with this message. For a description of
the various levels, see "logging level" on page 4-33.
Event Message: The content of the log message.
4-61
Security

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents