Users Guide

Table Of Contents
322 | Index Dell PowerConnect W-AirWave 7.5 | User Guide
product overview
Configuring Date and Time
...............................6
defining a scan.................................................109
executing a scan...............................................110
navigating...........................................................10
protocols and ports ....................................................9
Proxim 4900M..........................................................88
Q
Quick Links....................................................213, 217
R
Radio Enabled option ...........................................143
Radio Role field.....................................................152
radio settings
Configuring for Groups
....................................85
radio statistics ................................................ 126–131
Radio table .............................................................123
RADIUS ...................................................................77
authentication ...................................................43
configuring authentication and authorization45,
46
integrating..........................................................46
RADIUS Authentication Issues............................201
Radius/ARM/IDS Events retention........................33
RAPIDS............................................................14, 173
audit log ...........................................................188
enabling..............................................................31
overview................................................................2
score override ...................................................187
setup .................................................................175
viewing ignored rogues....................................186
Recent Events table ...............................................126
Replace Hardware button......................................150
reports.....................................................................233
Capacity Planning...........................................238
Client Session..................................................256
Configuration Audit .......................................240
Creating, Running, and Emailing..................233
Custom.............................................................237
Defining Custom Reports ..............................257
Dell License.....................................................238
Device Summary..............................................241
Device Uptime.........................................243, 317
emailing and exporting ...................................261
IDS Events.......................................................244
Inventory..........................................................245
Memory and CPU Utilization........................247
Network Usage.................................................247
New Clients ..................................................... 250
New Rogue Devices......................................... 248
RADIUS Authentication Issues ..................... 252
RF Health Report ........................................... 253
Rogue Clients.................................................. 255
Rogue Containment Audit............................. 256
transferring with FTP ..................................... 262
Restoring from Backup.......................................... 230
RF Health Report.................................................. 253
RFprotect license................................................... 151
Rogue AP Discovery Events.................................... 32
Rogue Association History table........................... 213
rogue classification ................................................ 173
Rogue Client Associations table........................... 185
rogue clients........................................... 185, 199, 255
rogue scanning
enabling in Groups > Radio
.................... 88, 286
Roles ........................................................................... 4
root password,changing ............................................. 8
routers and switches............................................... 132
Adding with a CSV File.................................. 115
RTLS Collector ....................................................... 34
Run a command menu .......................................... 213
S
scan credentials...................................................... 109
scan sets.................................................................. 109
scanning
defining credentials
........................................ 108
security
auditing PCI compliance
................................. 63
Configuring ACS servers .................................. 61
Configuring Group Security Settings.............. 79
configuring group SSIDs and VLANs.............. 82
configuring LDAP............................................. 43
configuring RADIUS ........................................ 43
configuring TACACS+ .................................... 43
integrating NMS ............................................... 62
RAPIDS and rogue classification................... 173
Server Settings
VisualRF Setup
............................................... 271
servers
specifying general settings
................................ 27
Severe Alert .............................................................. 27
Shared Secret key................................................... 311