Table of Contents

Advertisement

Index

802.1 1b/802.1 1g rates, 23
802.1 1g protection, 26
802.1 1n, 17
802.1 1n example, 21
802.1 1n rates, 24
802.1X authentication, 36
802.1X authentication example, 41
access point, 9
ACK policy, 57
association, 1 1
authentication, 1 1
authentication modes, 28
basic concepts, WLAN service, 9
blacklist, 52
blacklist and white list, 52
CAC admission policies, 56
CAC service example, 60
CCMP cipher suite, 35
cipher suite, 34
client, 9
client access authentication, 30
configuring a WLAN-BSS interface, 1
configuring a WLAN-Ethernet interface, 3
configuring a WLAN-radio interface, 1
configuring WLAN IDS frame filtering, 53
configuring WLAN security, 31
configuring WLAN service, 14
contacting HP, 64
country code, 14
data transmit rates, 23
documentation
conventions used, 65
website, 64
EDCA parameter configuration failure, 63
enabling an authentication method, 31
entering WLAN-Ethernet interface view, 2
fat AP, 9
flood attack detection, 49
global WLAN parameters, 14
GTK rekey based on packet, 32
GTK rekey based on time, 32
GTK rekey method, 32
HP
customer support and resources, 64
document conventions, 65
documents and manuals, 64
icons used, 65
subscription service, 64
support contact information, 64
symbols used, 65
websites, 64
icons, 65
IDS attack detection, 50
displaying and maintaining, 51
MAC and PSK authentication example, 38
MAC authentication, 36
manuals, 64
multi-ESS, 13
non-dot1 1h channel scanning, 26
open system authentication, 28
other related procedures, WLAN service, 12
port security, 35
pre-RSN, 48
PSK authentication, 35
PSK authentication example, 37
PTK lifetime, 31
QoS terminology, 55
radio of the AP, 16
radio parameters, 15
RSN, 46
RSN security IE, 33
scanning, 10
security IE, 33
shared key authentication, 28
single BSS, 12
single ESS Multi-BSS (the multi-radio case), 13
specifying a permitted SSID in a user profile, 19
spoofing attack detection, 50
SSID, 9
SSID-based access control, 19
subscription service, 64
support and other resources, 64
supported combinations for ciphers, 46
SVP, 57
SVP or CAC configuration failure, 63
SVP service example, 62
symbols, 65
TKIP cipher suite, 34
U-APSD power-save mechanism, 57
weak IV detection, 50
websites, 64
WEP cipher suite, 34
67

Advertisement

Table of Contents
loading

Table of Contents