D-Link DWS-1008 - AirPremier MobileLAN Switch Product Manual page 12

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008 - AirPremier MobileLAN Switch:
Table of Contents

Advertisement

Committing a Security ACL ................................................................................................231
Viewing Security ACL Information .....................................................................................231
Viewing the Edit Buffer ..................................................................................................232
Viewing Committed Security ACLs ................................................................................232
Viewing Security ACL Details ........................................................................................233
Displaying Security ACL Hits .........................................................................................233
Clearing Security ACLs ......................................................................................................234
Mapping Security ACLs ............................................................................................................234
Mapping User-Based Security ACLs .................................................................................235
Displaying ACL Maps to Ports, VLANs, and Virtual Ports ..............................................237
Clearing a Security ACL Map ........................................................................................237
Modifying a Security ACL .........................................................................................................238
Adding Another ACE to a Security ACL .............................................................................239
Placing One ACE before Another ......................................................................................240
Modifying an Existing Security ACL ...................................................................................241
Clearing Security ACLs from the Edit Buffer ......................................................................242
Using ACLs to Change CoS .....................................................................................................243
Filtering Based on DSCP Values .......................................................................................244
Using the dscp Option ...................................................................................................244
Using the precedence and tos Options .........................................................................245
Enabling Prioritization for Legacy Voice over IP .......................................................................246
General Guidelines ............................................................................................................246
Enabling VoIP Support for TeleSym VoIP ...........................................................................247
Enabling SVP Optimization for SpectraLink Phones .........................................................248
Known Limitations .........................................................................................................248
Configuring a Service Profile for RSN (WPA2) ..............................................................249
Configuring a Service Profile for WPA ...........................................................................249
Configuring a Radio Profile............................................................................................250
Configuring a VLAN and AAA for Voice Clients .............................................................250
Configuring an ACL to Prioritize Voice Traffic ................................................................251
Restricting Client-To-Client Forwarding Among IP-Only Clients ...............................................253
Security ACL Configuration Scenario .......................................................................................254
Managing Keys and Certificates .................................................................................................255
Why Use Keys and Certificates? ..............................................................................................255
Wireless Security through TLS ..........................................................................................255
PEAP-MS-CHAP-V2 Security ............................................................................................256
About Keys and Certificates .....................................................................................................256
Public Key Infrastructures ..................................................................................................257
Public and Private Keys .....................................................................................................257
Digital Certificates ..............................................................................................................258
PKCS #7, PKCS #10, and PKCS #12 Object Files ...........................................................258
Certificates Automatically Generated by MSS ..........................................................................260
Creating Keys and Certificates ................................................................................................260
D-Link DWS-1008 User Manual
xi

Advertisement

Table of Contents
loading

Table of Contents