Sign in today to find solutions:

Don't have an account? Sign up

3Com WX2200 3CRWX220095A Manuals

Manuals and User Guides for 3Com WX2200 3CRWX220095A

We have 1 3Com WX2200 3CRWX220095A manual available for free PDF download: Configuration Manual

  • 3Com WX2200 3CRWX220095A Configuration Manual (728 pages)

    3com wireless lan mobility system configuration guide

    Table of contents
    Table Of Contents3................................................................................................................................................................
    Conventions23................................................................................................................................................................
    Documentation24................................................................................................................................................................
    Documentation Comments25................................................................................................................................................................
    Overview27................................................................................................................................................................
    CLI Conventions27................................................................................................................................................................
    Command Prompts28................................................................................................................................................................
    Syntax Notation28................................................................................................................................................................
    Text Entry Conventions and Allowed Characters28................................................................................................................................................................
    Virtual LAN Identification33................................................................................................................................................................
    Command-Line Editing33................................................................................................................................................................
    Keyboard Shortcuts33................................................................................................................................................................
    History Buffer34................................................................................................................................................................
    Tabs34................................................................................................................................................................
    Single-Asterisk (*) Wildcard Character34................................................................................................................................................................
    Double-Asterisk (**) Wildcard Characters34................................................................................................................................................................
    Using CLI Help34................................................................................................................................................................
    Understanding Command Descriptions36................................................................................................................................................................
    Quick Starts37................................................................................................................................................................
    Web Manager38................................................................................................................................................................
    How a WX Switch Gets its Configuration39................................................................................................................................................................
    Web Quick Start Parameters40................................................................................................................................................................
    Web Quick Start Requirements41................................................................................................................................................................
    Accessing the Web Quick Start41................................................................................................................................................................
    CLI quickstart Command44................................................................................................................................................................
    Quickstart Example46................................................................................................................................................................
    Remote WX Configuration49................................................................................................................................................................
    Manager49................................................................................................................................................................
    Before You Start54................................................................................................................................................................
    About Administrative Access54................................................................................................................................................................
    Access Modes54................................................................................................................................................................
    Types of Administrative Access54................................................................................................................................................................
    First-Time Configuration via the Console55................................................................................................................................................................
    Enabling an Administrator55................................................................................................................................................................
    Setting the WX Switch Enable Password56................................................................................................................................................................
    Authenticating at the Console57................................................................................................................................................................
    Setting User Passwords58................................................................................................................................................................
    Adding and Clearing Local Users for Administrative Access59................................................................................................................................................................
    Configuring Accounting for Administrative Users59................................................................................................................................................................
    Displaying the AAA Configuration61................................................................................................................................................................
    Saving the Configuration61................................................................................................................................................................
    Administrative AAA Configuration Scenarios62................................................................................................................................................................
    Local Authentication62................................................................................................................................................................
    Local Authentication for Console Users and RADIUS Authentication for Telnet Users62................................................................................................................................................................
    Configuring Passwords66................................................................................................................................................................
    Setting Passwords for Local Users66................................................................................................................................................................
    Enabling Password Restrictions67................................................................................................................................................................
    Setting the Maximum Number of Login Attempts67................................................................................................................................................................
    Restoring Access to a Locked-Out User68................................................................................................................................................................
    Configuring and Managing Ports71................................................................................................................................................................
    Setting the Port Type71................................................................................................................................................................
    Configuring Interface Preference on a Dual-Interface Gigabit Ethernet Port (WX4400 only)78................................................................................................................................................................
    Configuring Port Operating Parameters79................................................................................................................................................................
    Displaying Port Information81................................................................................................................................................................
    Configuring Load-Sharing Port Groups85................................................................................................................................................................
    Configuring and Managing VLANs87................................................................................................................................................................
    Understanding VLANs in 3Com MSS87................................................................................................................................................................
    Configuring a VLAN91................................................................................................................................................................
    Restricting Layer 2 Forwarding Among Clients94................................................................................................................................................................
    Displaying VLAN Information95................................................................................................................................................................
    Managing the Layer 2 Forwarding Database96................................................................................................................................................................
    Types of Forwarding Database Entries96................................................................................................................................................................
    How Entries Enter the Forwarding Database96................................................................................................................................................................
    Displaying Forwarding Database Information97................................................................................................................................................................
    Adding an Entry to the Forwarding Database98................................................................................................................................................................
    Removing Entries from the Forwarding Database98................................................................................................................................................................
    Port and VLAN Configuration Scenario100................................................................................................................................................................
    MTU Support103................................................................................................................................................................
    Configuring and Managing IP Interfaces104................................................................................................................................................................
    Adding an IP Interface104................................................................................................................................................................
    Displaying IP Interface Information107................................................................................................................................................................
    Disabling or Reenabling an IP Interface107................................................................................................................................................................
    Removing an IP Interface107................................................................................................................................................................
    Configuring the System IP Address108................................................................................................................................................................
    Designating the System IP Address108................................................................................................................................................................
    Displaying the System IP Address108................................................................................................................................................................
    Clearing the System IP Address108................................................................................................................................................................
    Configuring and Managing IP Routes108................................................................................................................................................................
    Displaying IP Routes110................................................................................................................................................................
    Adding a Static Route111................................................................................................................................................................
    Managing the Management Services113................................................................................................................................................................
    Managing SSH113................................................................................................................................................................
    Managing Telnet116................................................................................................................................................................
    Managing HTTPS118................................................................................................................................................................
    Setting a Message of the Day (MOTD) Banner120................................................................................................................................................................
    Prompting the User to Acknowledge the MOTD Banner120................................................................................................................................................................
    Configuring and Managing DNS121................................................................................................................................................................
    Enabling or Disabling the DNS Client121................................................................................................................................................................
    Configuring DNS Servers121................................................................................................................................................................
    Configuring a Default Domain Name122................................................................................................................................................................
    Displaying DNS Server Information122................................................................................................................................................................
    Configuring and Managing Aliases123................................................................................................................................................................
    Adding an Alias123................................................................................................................................................................
    Removing an Alias123................................................................................................................................................................
    Displaying Aliases123................................................................................................................................................................
    Configuring and Managing Time Parameters124................................................................................................................................................................
    Adding an NTP Server128................................................................................................................................................................
    Removing an NTP Server128................................................................................................................................................................
    Changing the NTP Update Interval128................................................................................................................................................................
    Resetting the Update Interval to the Default129................................................................................................................................................................
    Enabling the NTP Client129................................................................................................................................................................
    Displaying NTP Information129................................................................................................................................................................
    Displaying ARP Table Entries130................................................................................................................................................................
    Managing the ARP Table130................................................................................................................................................................
    Adding an ARP Entry131................................................................................................................................................................
    Changing the Aging Timeout131................................................................................................................................................................
    Pinging Another Device132................................................................................................................................................................
    Logging In to a Remote Device132................................................................................................................................................................
    Tracing a Route133................................................................................................................................................................
    IP Interfaces and Services Configuration Scenario135................................................................................................................................................................
    Configuring SNMP139................................................................................................................................................................
    Setting the System Location and Contact Strings140................................................................................................................................................................
    Enabling SNMP Versions140................................................................................................................................................................
    Configuring Community Strings (SNMPv1 and SNMPv2c Only)140................................................................................................................................................................
    Creating a USM User for SNMPv3141................................................................................................................................................................
    Configuring a Notification Profile144................................................................................................................................................................
    Enabling the SNMP Service151................................................................................................................................................................
    Displaying SNMP Information151................................................................................................................................................................
    Displaying SNMP Version and Status Information151................................................................................................................................................................
    Displaying the Configured SNMP Community Strings151................................................................................................................................................................
    Displaying USM Settings151................................................................................................................................................................
    Displaying Notification Profiles152................................................................................................................................................................
    Displaying Notification Targets152................................................................................................................................................................
    Displaying SNMP Statistics Counters152................................................................................................................................................................
    About the Mobility Domain Feature153................................................................................................................................................................
    Configuring a Mobility Domain154................................................................................................................................................................
    Configuring Mobility Domain Seed Redundancy156................................................................................................................................................................
    Clearing a Mobility Domain Member from a Seed157................................................................................................................................................................
    Displaying Mobility Domain Status157................................................................................................................................................................
    Displaying the Mobility Domain Configuration157................................................................................................................................................................
    Clearing a Mobility Domain from a WX Switch157................................................................................................................................................................
    Configuring WX-WX Security158................................................................................................................................................................
    Monitoring the VLANs and Tunnels in a Mobility Domain159................................................................................................................................................................
    Displaying Roaming Stations159................................................................................................................................................................
    Displaying Roaming VLANs and Their Affinities160................................................................................................................................................................
    Displaying Tunnel Information160................................................................................................................................................................
    Understanding the Sessions of Roaming Users161................................................................................................................................................................
    Requirements for Roaming to Succeed161................................................................................................................................................................
    Effects of Timers on Roaming162................................................................................................................................................................
    Monitoring Roaming Sessions162................................................................................................................................................................
    Mobility Domain Scenario163................................................................................................................................................................
    About the Network Domain Feature165................................................................................................................................................................
    Network Domain Seed Affinity168................................................................................................................................................................
    Configuring a Network Domain169................................................................................................................................................................
    Configuring Network Domain Seeds169................................................................................................................................................................
    Displaying Network Domain Information172................................................................................................................................................................
    Clearing Network Domain Configuration from a WX Switch173................................................................................................................................................................
    Clearing a Network Domain Seed from a WX Switch173................................................................................................................................................................
    Clearing a Network Domain Peer from a Network Domain Seed173................................................................................................................................................................
    Switch173................................................................................................................................................................
    Network Domain Scenario174................................................................................................................................................................
    MAP Overview177................................................................................................................................................................
    Country of Operation179................................................................................................................................................................
    Directly Connected MAPs and Distributed MAPs179................................................................................................................................................................
    Boot Process for Distributed MAPs189................................................................................................................................................................
    Contacting a WX Switch190................................................................................................................................................................
    Loading and Activating an Operational Image195................................................................................................................................................................
    Service Profiles202................................................................................................................................................................
    Radio Profiles209................................................................................................................................................................
    Configuring MAPs213................................................................................................................................................................
    Specifying the Country of Operation213................................................................................................................................................................
    Configuring an Auto-AP Profile for Automatic MAP Configuration218................................................................................................................................................................
    Configuring MAP Port Parameters224................................................................................................................................................................
    Configuring a Service Profile233................................................................................................................................................................
    Configuring a Radio Profile240................................................................................................................................................................
    Configuring Radio-Specific Parameters246................................................................................................................................................................
    Disabling or Reenabling Radios250................................................................................................................................................................
    Enabling or Disabling Individual Radios250................................................................................................................................................................
    Disabling or Reenabling All Radios Using a Profile250................................................................................................................................................................
    Resetting a Radio to its Factory Default Settings251................................................................................................................................................................
    Restarting a MAP251................................................................................................................................................................
    Configuring Local Packet Switching on MAPs252................................................................................................................................................................
    Configuring Local Switching253................................................................................................................................................................
    Displaying MAP Information256................................................................................................................................................................
    Displaying MAP Configuration Information256................................................................................................................................................................
    Displaying Connection Information for Distributed MAPs257................................................................................................................................................................
    Displaying a List of Distributed MAPs that Are Not Configured258................................................................................................................................................................
    Displaying Active Connection Information for Distributed MAPs258................................................................................................................................................................
    Displaying Service Profile Information259................................................................................................................................................................
    Displaying Radio Profile Information260................................................................................................................................................................
    Displaying MAP Status Information260................................................................................................................................................................
    Displaying Static IP Address Information for Distributed MAPs261................................................................................................................................................................
    Displaying MAP Statistics Counters262................................................................................................................................................................
    Displaying the Forwarding Database for a MAP264................................................................................................................................................................
    Displaying VLAN Information for a MAP264................................................................................................................................................................
    Displaying ACL Information for a MAP265................................................................................................................................................................
    RF Load Balancing Overview267................................................................................................................................................................
    Configuring RF Load Balancing268................................................................................................................................................................
    Disabling or Re-Enabling RF Load Balancing268................................................................................................................................................................
    Specifying Band Preference for RF Load Balancing269................................................................................................................................................................
    Assigning Radios to Load Balancing Groups269................................................................................................................................................................
    Setting Strictness for RF Load Balancing270................................................................................................................................................................
    Exempting an SSID from RF Load Balancing271................................................................................................................................................................
    Displaying RF Load Balancing Information271................................................................................................................................................................
    WLAN Mesh Services Overview273................................................................................................................................................................
    Configuring WLAN Mesh Services274................................................................................................................................................................
    Configuring the Mesh AP275................................................................................................................................................................
    Configuring Security276................................................................................................................................................................
    Enabling Link Calibration Packets on the Mesh Portal MAP277................................................................................................................................................................
    Deploying the Mesh AP277................................................................................................................................................................
    Configuring Wireless Bridging278................................................................................................................................................................
    Displaying WLAN Mesh Services Information279................................................................................................................................................................
    Configuring WPA284................................................................................................................................................................
    WPA Cipher Suites284................................................................................................................................................................
    TKIP Countermeasures287................................................................................................................................................................
    WPA Authentication Methods288................................................................................................................................................................
    WPA Information Element288................................................................................................................................................................
    Client Support289................................................................................................................................................................
    Configuring RSN (802.11i)296................................................................................................................................................................
    Creating a Service Profile for RSN296................................................................................................................................................................
    Enabling RSN296................................................................................................................................................................
    Specifying the RSN Cipher Suites297................................................................................................................................................................
    Configuring WEP299................................................................................................................................................................
    Setting Static WEP Key Values301................................................................................................................................................................
    Assigning Static WEP Keys301................................................................................................................................................................
    Enabling WPA with TKIP302................................................................................................................................................................
    Encryption Configuration Scenarios302................................................................................................................................................................
    Enabling Dynamic WEP in a WPA Network304................................................................................................................................................................
    Configuring Encryption for MAC Clients306................................................................................................................................................................
    Initial Channel and Power Assignment311................................................................................................................................................................
    Channel and Power Tuning312................................................................................................................................................................
    RF Auto-Tuning Parameters314................................................................................................................................................................
    Changing RF Auto-Tuning Settings316................................................................................................................................................................
    Selecting Available Channels on the 802.11a Radio Changing Channel Tuning Settings316................................................................................................................................................................
    Locking Down Tuned Settings318................................................................................................................................................................
    Displaying RF Auto-Tuning Information319................................................................................................................................................................
    Displaying RF Auto-Tuning Settings319................................................................................................................................................................
    Displaying RF Neighbors320................................................................................................................................................................
    Using an AeroScout Engine325................................................................................................................................................................
    About QoS327................................................................................................................................................................
    Summary of QoS Features327................................................................................................................................................................
    QoS Mode330................................................................................................................................................................
    WMM QoS Mode331................................................................................................................................................................
    WMM QoS on a MAP337................................................................................................................................................................
    Call Admission Control340................................................................................................................................................................
    Broadcast Control341................................................................................................................................................................
    Static CoS341................................................................................................................................................................
    Overriding CoS341................................................................................................................................................................
    Changing QoS Settings342................................................................................................................................................................
    Changing the QoS Mode342................................................................................................................................................................
    Enabling U-APSD Support342................................................................................................................................................................
    Changing CoS Mappings344................................................................................................................................................................
    Using the Client's DSCP Value to Classify QoS Level344................................................................................................................................................................
    Enabling Broadcast Control345................................................................................................................................................................
    Displaying QoS Information345................................................................................................................................................................
    Displaying a Radio Profile's QoS Settings345................................................................................................................................................................
    Displaying a Service Profile's QoS Settings346................................................................................................................................................................
    Displaying CoS Mappings347................................................................................................................................................................
    Displaying the DSCP Table349................................................................................................................................................................
    Displaying MAP Forwarding Queue Statistics349................................................................................................................................................................
    Enabling the Spanning Tree Protocol352................................................................................................................................................................
    Changing Standard Spanning Tree Parameters352................................................................................................................................................................
    Bridge Priority352................................................................................................................................................................
    Port Cost353................................................................................................................................................................
    Port Priority353................................................................................................................................................................
    Changing the Bridge Priority353................................................................................................................................................................
    Changing Spanning Tree Timers357................................................................................................................................................................
    Configuring and Managing STP Fast Convergence Features358................................................................................................................................................................
    Configuring Port Fast Convergence359................................................................................................................................................................
    Displaying Port Fast Convergence Information360................................................................................................................................................................
    Configuring Backbone Fast Convergence360................................................................................................................................................................
    Displaying the Backbone Fast Convergence State360................................................................................................................................................................
    Configuring Uplink Fast Convergence361................................................................................................................................................................
    Displaying Uplink Fast Convergence Information361................................................................................................................................................................
    Displaying Spanning Tree Information361................................................................................................................................................................
    Displaying STP Bridge and Port Information361................................................................................................................................................................
    Displaying the STP Port Cost on a VLAN Basis362................................................................................................................................................................
    Displaying Blocked STP Ports363................................................................................................................................................................
    Displaying Spanning Tree Statistics363................................................................................................................................................................
    Spanning Tree Configuration Scenario365................................................................................................................................................................
    Clearing STP Statistics365................................................................................................................................................................
    Disabling or Reenabling IGMP Snooping369................................................................................................................................................................
    Disabling or Reenabling Proxy Reporting370................................................................................................................................................................
    Enabling the Pseudo-Querier370................................................................................................................................................................
    Changing IGMP Timers370................................................................................................................................................................
    Changing the Query Interval371................................................................................................................................................................
    Changing the Query Response Interval371................................................................................................................................................................
    Changing the Last Member Query Interval371................................................................................................................................................................
    Enabling Router Solicitation372................................................................................................................................................................
    Changing the Router Solicitation Interval372................................................................................................................................................................
    Configuring Static Multicast Ports372................................................................................................................................................................
    Adding or Removing a Static Multicast Receiver Port Displaying Multicast Information373................................................................................................................................................................
    Displaying Multicast Routers375................................................................................................................................................................
    Displaying Multicast Receivers376................................................................................................................................................................
    About Security Access Control Lists377................................................................................................................................................................
    Overview of Security ACL Commands377................................................................................................................................................................
    Security ACL Filters378................................................................................................................................................................
    Order in Which ACLs are Applied to Traffic379................................................................................................................................................................
    Creating and Committing a Security ACL380................................................................................................................................................................
    Setting a Source IP ACL380................................................................................................................................................................
    Setting an ICMP ACL383................................................................................................................................................................
    Setting TCP and UDP ACLs385................................................................................................................................................................
    Determining the ACE Order386................................................................................................................................................................
    Committing a Security ACL387................................................................................................................................................................
    Viewing Security ACL Information387................................................................................................................................................................
    Clearing Security ACLs390................................................................................................................................................................
    Mapping Security ACLs390................................................................................................................................................................
    Mapping User-Based Security ACLs390................................................................................................................................................................
    Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed MAPs392................................................................................................................................................................
    Modifying a Security ACL394................................................................................................................................................................
    Adding Another ACE to a Security ACL394................................................................................................................................................................
    Placing One ACE before Another395................................................................................................................................................................
    Modifying an Existing Security ACL396................................................................................................................................................................
    Clearing Security ACLs from the Edit Buffer397................................................................................................................................................................
    Using ACLs to Change CoS399................................................................................................................................................................
    Filtering Based on DSCP Values399................................................................................................................................................................
    Enabling Prioritization for Legacy Voice over IP401................................................................................................................................................................
    General Guidelines402................................................................................................................................................................
    Enabling VoIP Support for TeleSym VoIP403................................................................................................................................................................
    Enabling SVP Optimization for SpectraLink Phones404................................................................................................................................................................
    Restricting Client-To-Client Forwarding Among IP-Only Clients409................................................................................................................................................................
    Security ACL Configuration Scenario410................................................................................................................................................................
    Why Use Keys and Certificates413................................................................................................................................................................
    Wireless Security through TLS414................................................................................................................................................................
    PEAP-MS-CHAP-V2 Security414................................................................................................................................................................
    About Keys and Certificates415................................................................................................................................................................
    Public Key Infrastructures416................................................................................................................................................................
    Public and Private Keys416................................................................................................................................................................
    Digital Certificates416................................................................................................................................................................
    PKCS #7, PKCS #10, and PKCS #12 Object Files417................................................................................................................................................................
    Certificates Automatically Generated by MSS418................................................................................................................................................................
    Creating Keys and Certificates419................................................................................................................................................................
    Choosing the Appropriate Certificate Installation Method for Your Network420................................................................................................................................................................
    Creating Public-Private Key Pairs421................................................................................................................................................................
    Generating Self-Signed Certificates422................................................................................................................................................................
    Creating a CSR and Installing a Certificate from a PKCS #7 Object File424................................................................................................................................................................
    Displaying Certificate and Key Information426................................................................................................................................................................
    Key and Certificate Configuration Scenarios427................................................................................................................................................................
    Creating Self-Signed Certificates427................................................................................................................................................................
    Installing CA-Signed Certificates from PKCS #12 Object Files429................................................................................................................................................................
    Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR) and a PKCS #7 Object File431................................................................................................................................................................
    About AAA for Network Users433................................................................................................................................................................
    Authentication433................................................................................................................................................................
    Authorization438................................................................................................................................................................
    Accounting440................................................................................................................................................................
    Summary of AAA Features440................................................................................................................................................................
    AAA Tools for Network Users441................................................................................................................................................................
    AAA Methods for IEEE 802.1X and Web Network Access442................................................................................................................................................................
    Changing the MAC Authorization Password for RADIUS443................................................................................................................................................................
    IEEE 802.1X Extensible Authentication Protocol Types446................................................................................................................................................................
    Ways a WX Switch Can Use EAP447................................................................................................................................................................
    Effects of Authentication Type on Encryption Method448................................................................................................................................................................
    Configuring 802.1X Authentication449................................................................................................................................................................
    Configuring EAP Offload449................................................................................................................................................................
    Using Pass-Through450................................................................................................................................................................
    Configuring Authentication and Authorization by MAC Address456................................................................................................................................................................
    Adding and Clearing MAC Users and User Groups Locally456................................................................................................................................................................
    Configuring Web Portal WebAAA460................................................................................................................................................................
    How WebAAA Portal Works460................................................................................................................................................................
    WebAAA Requirements and Recommendations462................................................................................................................................................................
    Using a Custom Login Page471................................................................................................................................................................
    Using Dynamic Fields in WebAAA Redirect URLs475................................................................................................................................................................
    Using an ACL Other Than portalacl476................................................................................................................................................................
    Configuring the Web Portal WebAAA Session Timeout Period477................................................................................................................................................................
    Configuring the Web Portal Logout Function478................................................................................................................................................................
    Configuring Last-Resort Access479................................................................................................................................................................
    Configuring Last-Resort Access for Wired Authentication Ports481................................................................................................................................................................
    Configuring AAA for Users of Third-Party APs482................................................................................................................................................................
    Authentication Process for Users of a Third-Party AP482................................................................................................................................................................
    Requirements483................................................................................................................................................................
    Configuring Authentication for 802.1X Users of a Third-Party AP with Tagged SSIDs484................................................................................................................................................................
    Configuring Authentication for Non-802.1X Users of a Third-Party AP with Tagged SSIDs487................................................................................................................................................................
    Configuring Access for Any Users of a Non-Tagged SSID487................................................................................................................................................................
    Assigning Authorization Attributes487................................................................................................................................................................
    Assigning Attributes to Users and Groups492................................................................................................................................................................
    Assigning a Security ACL to a User or a Group494................................................................................................................................................................
    Clearing a Security ACL from a User or Group495................................................................................................................................................................
    Assigning Encryption Types to Wireless Users496................................................................................................................................................................
    Keeping Users on the Same VLAN Even After Roaming498................................................................................................................................................................
    Overriding or Adding Attributes Locally with a Location Policy499................................................................................................................................................................
    About the Location Policy500................................................................................................................................................................
    How the Location Policy Differs from a Security ACL500................................................................................................................................................................
    Setting the Location Policy501................................................................................................................................................................
    Clearing Location Policy Rules and Disabling the Location Policy503................................................................................................................................................................
    Configuring Accounting for Wireless Network Users504................................................................................................................................................................
    Viewing Local Accounting Records505................................................................................................................................................................
    Viewing Roaming Accounting Records505................................................................................................................................................................
    Avoiding AAA Problems in Configuration Order508................................................................................................................................................................
    Using Authentication and Accounting Rules Together508................................................................................................................................................................
    Configuring a Mobility Profile510................................................................................................................................................................
    Network User Configuration Scenarios512................................................................................................................................................................
    General Use of Network User Commands512................................................................................................................................................................
    Enabling RADIUS Pass-Through Authentication514................................................................................................................................................................
    Enabling PEAP-MS-CHAP-V2 Authentication514................................................................................................................................................................
    Enabling PEAP-MS-CHAP-V2 Offload515................................................................................................................................................................
    Overriding AAA-Assigned VLANs516................................................................................................................................................................
    RADIUS Overview519................................................................................................................................................................
    Configuring MAC Authentication and Authorization520................................................................................................................................................................
    Before You Begin521................................................................................................................................................................
    Configuring RADIUS Servers521................................................................................................................................................................
    Configuring Individual RADIUS Servers522................................................................................................................................................................
    Deleting RADIUS Servers524................................................................................................................................................................
    Configuring RADIUS Server Groups524................................................................................................................................................................
    Creating Server Groups525................................................................................................................................................................
    Deleting a Server Group527................................................................................................................................................................
    RADIUS and Server Group Configuration Scenario528................................................................................................................................................................
    Managing 802.1X on Wired Authentication Ports531................................................................................................................................................................
    Enabling and Disabling 802.1X Globally531................................................................................................................................................................
    Managing 802.1X Encryption Keys533................................................................................................................................................................
    Enabling 802.1X Key Transmission533................................................................................................................................................................
    Configuring 802.1X Key Transmission Time Intervals533................................................................................................................................................................
    Managing WEP Keys534................................................................................................................................................................
    Setting EAP Retransmission Attempts535................................................................................................................................................................
    Managing 802.1X Client Reauthentication536................................................................................................................................................................
    Enabling and Disabling 802.1X Reauthentication536................................................................................................................................................................
    Setting the Maximum Number of 802.1X Reauthentication Attempts536................................................................................................................................................................
    Setting the Bonded Authentication Period538................................................................................................................................................................
    Managing Other Timers538................................................................................................................................................................
    Setting the 802.1X Quiet Period538................................................................................................................................................................
    Setting the 802.1X Timeout for a Client539................................................................................................................................................................
    Displaying 802.1X Information540................................................................................................................................................................
    Viewing 802.1X Clients540................................................................................................................................................................
    Viewing the 802.1X Configuration540................................................................................................................................................................
    Viewing 802.1X Statistics541................................................................................................................................................................
    About SODA Endpoint Security543................................................................................................................................................................
    SODA Endpoint Security Support on WX Switches544................................................................................................................................................................
    How SODA Functionality Works on WX Switches545................................................................................................................................................................
    Configuring SODA Functionality546................................................................................................................................................................
    Configuring Web Portal WebAAA for the Service Profile547................................................................................................................................................................
    Creating the SODA Agent with SODA Manager547................................................................................................................................................................
    Specifying a SODA Agent Success Page551................................................................................................................................................................
    Specifying a SODA Agent Failure Page551................................................................................................................................................................
    Specifying an Alternate SODA Agent Directory for a Service Profile554................................................................................................................................................................
    Uninstalling the SODA Agent Files from the WX Switch554................................................................................................................................................................
    Displaying SODA Configuration Information555................................................................................................................................................................
    About the Session Manager557................................................................................................................................................................
    Displaying and Clearing Administrative Sessions557................................................................................................................................................................
    Displaying and Clearing All Administrative Sessions558................................................................................................................................................................
    Displaying and Clearing an Administrative Console Session558................................................................................................................................................................
    Displaying and Clearing Administrative Telnet Sessions559................................................................................................................................................................
    Displaying and Clearing Client Telnet Sessions559................................................................................................................................................................
    Displaying and Clearing Network Sessions560................................................................................................................................................................
    Displaying Verbose Network Session Information561................................................................................................................................................................
    Displaying and Clearing Network Sessions by Username562................................................................................................................................................................
    Displaying and Clearing Network Sessions by MAC Address563................................................................................................................................................................
    Displaying and Clearing Network Sessions by VLAN Name563................................................................................................................................................................
    Displaying and Clearing Network Sessions by Session ID564................................................................................................................................................................
    Displaying and Changing Network Session Timers565................................................................................................................................................................
    About Rogues and RF Detection567................................................................................................................................................................
    Rogue Access Points and Clients567................................................................................................................................................................
    RF Detection Scans571................................................................................................................................................................
    Countermeasures572................................................................................................................................................................
    Summary of Rogue Detection Features573................................................................................................................................................................
    Configuring Rogue Detection Lists574................................................................................................................................................................
    Configuring a Permitted Vendor List574................................................................................................................................................................
    Configuring a Client Black List577................................................................................................................................................................
    Configuring an Attack List578................................................................................................................................................................
    Enabling Countermeasures580................................................................................................................................................................
    Enabling MAP Signatures582................................................................................................................................................................
    IDS and DoS Alerts584................................................................................................................................................................
    Flood Attacks585................................................................................................................................................................
    DoS Attacks585................................................................................................................................................................
    Netstumbler and Wellenreiter Applications586................................................................................................................................................................
    Wireless Bridge586................................................................................................................................................................
    Ad-Hoc Network586................................................................................................................................................................
    Weak WEP Key Used by Client587................................................................................................................................................................
    Disallowed Devices or SSIDs587................................................................................................................................................................
    Displaying Statistics Counters587................................................................................................................................................................
    IDS Log Message Examples587................................................................................................................................................................
    Displaying RF Detection Information590................................................................................................................................................................
    Configuring a Permitted SSID List591................................................................................................................................................................
    Configuring an Ignore List591................................................................................................................................................................
    Displaying Rogue Clients592................................................................................................................................................................
    Displaying Rogue Detection Counters593................................................................................................................................................................
    Displaying the APs Detected by MAP Radio596................................................................................................................................................................
    Displaying Countermeasures Information597................................................................................................................................................................
    About System Files599................................................................................................................................................................
    Displaying Software Version Information599................................................................................................................................................................
    Displaying Boot Information601................................................................................................................................................................
    Working with Files602................................................................................................................................................................
    Displaying a List of Files602................................................................................................................................................................
    Copying a File604................................................................................................................................................................
    Using an Image File's MD5 Checksum To Verify Its Integrity606................................................................................................................................................................
    Deleting a File607................................................................................................................................................................
    Creating a Subdirectory608................................................................................................................................................................
    Removing a Subdirectory608................................................................................................................................................................
    Managing Configuration Files609................................................................................................................................................................
    Displaying the Running Configuration609................................................................................................................................................................
    Specifying a Backup Configuration File612................................................................................................................................................................
    Resetting to the Factory Default Configuration612................................................................................................................................................................
    Backing Up and Restoring the System613................................................................................................................................................................
    Upgrading the System Image616................................................................................................................................................................
    Preparing the WX Switch for the Upgrade616................................................................................................................................................................
    Upgrading an Individual Switch Using the CLI617................................................................................................................................................................
    Command Changes During Upgrade618................................................................................................................................................................
    Fixing Common WX Setup Problems619................................................................................................................................................................
    Configuring and Managing the System Log623................................................................................................................................................................
    Log Message Components623................................................................................................................................................................
    Logging Destinations and Levels623................................................................................................................................................................
    Using Log Commands625................................................................................................................................................................
    Running Traces631................................................................................................................................................................
    Displaying a Trace632................................................................................................................................................................
    Stopping a Trace632................................................................................................................................................................
    About Trace Results633................................................................................................................................................................
    Displaying Trace Results633................................................................................................................................................................
    Copying Trace Results to a Server634................................................................................................................................................................
    Clearing the Trace Log634................................................................................................................................................................
    List of Trace Areas634................................................................................................................................................................
    Using display Commands635................................................................................................................................................................
    Viewing VLAN Interfaces635................................................................................................................................................................
    Viewing AAA Session Statistics635................................................................................................................................................................
    Viewing FDB Information636................................................................................................................................................................
    Viewing ARP Information636................................................................................................................................................................
    Port Mirroring637................................................................................................................................................................
    Configuration Requirements637................................................................................................................................................................
    Configuring Port Mirroring637................................................................................................................................................................
    Displaying the Port Mirroring Configuration637................................................................................................................................................................
    Clearing the Port Mirroring Configuration637................................................................................................................................................................
    Remotely Monitoring Traffic638................................................................................................................................................................
    How Remote Traffic Monitoring Works638................................................................................................................................................................
    Best Practices for Remote Traffic Monitoring639................................................................................................................................................................
    Configuring a Snoop Filter639................................................................................................................................................................
    Mapping a Snoop Filter to a Radio641................................................................................................................................................................
    Enabling or Disabling a Snoop Filter643................................................................................................................................................................
    Displaying Remote Traffic Monitoring Statistics643................................................................................................................................................................
    Preparing an Observer and Capturing Traffic643................................................................................................................................................................
    The display tech-support Command645................................................................................................................................................................
    Core Files646................................................................................................................................................................
    Debug Messages647................................................................................................................................................................
    System Requirements649................................................................................................................................................................
    Browser Requirements649................................................................................................................................................................
    WX Switch Requirements649................................................................................................................................................................
    Logging Into Web View650................................................................................................................................................................
    Attributes651................................................................................................................................................................
    Supported Standard and Extended Attributes652................................................................................................................................................................
    Com Vendor-Specific Attributes659................................................................................................................................................................
    E DHCP S ERVER663................................................................................................................................................................
    How the MSS DHCP Server Works664................................................................................................................................................................
    Configuring the DHCP Server665................................................................................................................................................................
    Displaying DHCP Server Information666................................................................................................................................................................
    Register Your Product to Gain Service Benefits667................................................................................................................................................................
    Solve Problems Online667................................................................................................................................................................
    Purchase Extended Warranty and Professional Services668................................................................................................................................................................
    Access Software Downloads668................................................................................................................................................................
    Contact Us668................................................................................................................................................................
    Telephone Technical Support and Repair669................................................................................................................................................................