Importing A Dhcpd.conf File; Dhcp Option 60; On-Board Kdc; Rogue Ap Detection - Symbol WS5000 Series System Reference Manual

Hide thumbs Also See for WS5000 Series:
Table of Contents

Advertisement

1-22
WS5000 Series Switch System Reference Guide
Subnet IP
Netmask IP
etc...

1.5.6.3 Importing a dhcpd.conf File

You can use a DHCP configuration file to configure the DHCP servers on the WS5000 Series Switch. The
configuration file must be named
system
Configuration
command from the
WS5100_VPN.(Cfg)> copy tftp system
Enter the file name to be copied from TFTP server : dhcpd.conf
IP address of the TFTP server : 192.168.xxx.xxx
Copying 'dhcpd.conf' from tftp://192.168.90.158 to Switch...
File: dhcpd.conf copied successfully from 192.168.90.158
Verifying conf file...
Valid conf file format.
The format of the
dhcpd.conf
rfc2131.html).
Note When you copy a
version of the file (on the switch) is overwritten.

1.5.6.4 DHCP Option 60

A feature of DHCP (Option 60) enables a DHCP server to recognize a DHCP client's equipment identifier, and
assign the device an IP drawn from an equipment-specific set of addresses (an IP pool). DHCP servers that
respond to Option 60 should only use DHCP Option 43 to return vendor-specific information to the DHCP client.

1.5.7 On-Board KDC

The WLAN Switch has an on-board Key Distribution Center (KDC) or Kerberos authentication server. The
WS5000 Series Switch provides a secure means for authenticating users/clients associated to a WLAN or ESS
with the Kerberos security policy applied.
The on-board KDC can be configured to use up to three Network Time Protocol servers (NTPs). A separate
switch with an on-board KDC can be configured as a Slave KDC to support the Master KDC in case of a Master
KDC failure.

1.5.8 Rogue AP Detection

Rogue Access Ports (APs) are an area of concern with respect to LAN security. The term Rogue AP denotes an
unauthorized access port connected to the production network or operating in a stand-alone mode (perhaps in
a parking lot or in a neighbor's building). Rogue APs are not under the management of network administrators
and do not conform to any network security policies.
Although 802.1x security settings should completely protect the LAN, organizations are not always fully
compliant with the newest wireless-security best practices. In addition, organizations want the ability to
detect and disarm rogue APs. The WS5000 Wireless Switch provides a mechanism for detecting and reporting
rogue APs. See
Chapter 7, Configuring Rogue AP
: 192.000.000.0
: 255.255.255.0
dhcpd.conf
. To install the file on the switch, use the
context:
file follows the convention declared in RFC 2131
dhcpd.conf
file to the WS5000 Series Switch, the previous
Detection.
copy tftp
(http://rfc.net/

Advertisement

Table of Contents
loading

Table of Contents