Configuration manual
Dell PowerConnect W-AirWave 7.4 | Configuration Guide Index | 171
Index
A
Adaptive Radio Management (ARM) 30
Advanced Services
defined
16
pages and field descriptions 155
Advanced Services > IP Mobility 158
Advanced Services > IP Mobility > Mobility Domain 160
Advanced Services > IP Mobility page 158
Advanced Services > VPN Services 161
Advanced Services > VPN Services > IKE 163
Advanced Services > VPN Services > IPSEC 166
Advanced Services > VPN Services > IPSEC > Dynamic Map 167
Advanced Services > VPN Services > IPSEC > Dynamic Map >
Transform Set
168
Advanced Services > VPN Services > L2TP 164
Advanced Services > VPN Services > PPTP 165
AP Overrides 39
guidelines 30
pages and field descriptions 39
APs
using in groups and folders
32
APs/Devices > List 12
APs/Devices > Manage 17
APs/Devices > Monitor 18
D
Dell PowerConnect W AP Groups
general procedures and guidelines
27
Dell PowerConnect W Configuration
Advanced Services
16
Folders, Users, and Visibility 20
initial setup 21
initial setup procedure 21
navigating 10
prerequisites 21
Profiles 15
Security 15
WLANs 14
device groups
using with APs
32
Device Setup > Dell PowerConnect W Configuration 11
E
Encryption 30
F
folders
using with APs
32
G
groups
using with APs
32
Groups > Basic 18
I
IP Mobility Domains 157
P
Profiles
defined
15
embedded configuration 19
overview 48
pages and field descriptions 48
Profiles > AAA 48
Profiles > AAA > 802.1x Auth 56
Profiles > AAA > Captive Portal Auth 57
Profiles > AAA > Mac Auth 59, 60
Profiles > AAA > Management Auth 67
Profiles > AAA > Stateful 802.1X Auth 65
Profiles > AAA > Stateful NTLM Auth 68
Profiles > AAA > VPN Auth 66
Profiles > AAA > Wired Auth Profile 66
Profiles > AAA > WISPr Auth 69
Profiles > AP 70
Profiles > AP > AP Ethernet Link 75
Profiles > AP > AP Wired 76
Profiles > AP > Regulatory Domain 74
Profiles > AP > SNMP 75
Profiles > AP > SNMP > SNMP User 75
Profiles > AP > System 75, 76
Profiles > IDS 82
Profiles > IDS > Denial of Service 86
Profiles > IDS > Denial of Service > Rate Threshold 89
Profiles > IDS > General 84
Profiles > IDS > Impersonation 90
Profiles > IDS > Signature Matching 85
Profiles > IDS > Signature Matching > Signatures 86
Profiles > IDS > Unauthorized Device 92
Profiles > Mesh 95
Profiles > Mesh > Cluster 104
Profiles > Mesh > Radio 96
Profiles > Mesh > Radio > Mesh HT SSID 98
Profiles > QoS 104
Profiles > QoS > Traffic Management 104
Profiles > QoS > VoIP Call Admission Control 105
Profiles > QoS > WMM Traffic Management 107
Profiles > RF 108
Profiles > RF > 802.11a/g Radio 109
Profiles > RF > 802.11a/g Radio > ARM 113
Profiles > RF > 802.11a/g Radio > High-Throughput (HT) Radio
116