67
Index
802.11b/802.11g rates, 23
802.11g protection, 26
802.11n, 17
802.11n example, 21
802.11n rates, 24
802.1X authentication, 36
802.1X authentication example, 41
access point, 9
ACK policy, 57
association, 11
authentication, 11
authentication modes, 28
basic concepts, WLAN service, 9
blacklist, 52
blacklist and white list, 52
CAC admission policies, 56
CAC service example, 60
CCMP cipher suite, 35
cipher suite, 34
client, 9
client access authentication, 30
configuring a WLAN-BSS interface, 1
configuring a WLAN-Ethernet interface, 3
configuring a WLAN-radio interface, 1
configuring WLAN IDS frame filtering, 53
configuring WLAN security, 31
configuring WLAN service, 14
contacting HP, 64
country code, 14
data transmit rates, 23
documentation
conventions used, 65
website, 64
EDCA parameter configuration failure, 63
enabling an authentication method, 31
entering WLAN-Ethernet interface view, 2
fat AP, 9
flood attack detection, 49
global WLAN parameters, 14
GTK rekey based on packet, 32
GTK rekey based on time, 32
GTK rekey method, 32
HP
customer support and resources, 64
document conventions, 65
documents and manuals, 64
icons used, 65
subscription service, 64
support contact information, 64
symbols used, 65
websites, 64
icons, 65
IDS attack detection, 50
displaying and maintaining, 51
MAC and PSK authentication example, 38
MAC authentication, 36
manuals, 64
multi-ESS, 13
non-dot11h channel scanning, 26
open system authentication, 28
other related procedures, WLAN service, 12
port security, 35
pre-RSN, 48
PSK authentication, 35
PSK authentication example, 37
PTK lifetime, 31
QoS terminology, 55
radio of the AP, 16
radio parameters, 15
RSN, 46
RSN security IE, 33
scanning, 10
security IE, 33
shared key authentication, 28
single BSS, 12
single ESS Multi-BSS (the multi-radio case), 13
specifying a permitted SSID in a user profile, 19
spoofing attack detection, 50
SSID, 9
SSID-based access control, 19
subscription service, 64
support and other resources, 64
supported combinations for ciphers, 46
SVP, 57
SVP or CAC configuration failure, 63
SVP service example, 62
symbols, 65
TKIP cipher suite, 34
U-APSD power-save mechanism, 57
weak IV detection, 50
websites, 64
WEP cipher suite, 34
Содержание a-msr
Страница 48: ...44 Figure 19 Configure the wireless card I ...
Страница 49: ...45 Figure 20 Configure the wireless card II ...