Manual Summary

The manual was written in by 3com. The language is listed as follows: Manual English. The manual is applied to the following one product model as follows: 3CWXM10A. The manual was created in Portable Document Format, called as PDF manual. The PDF document file with the name of msscfgguide4-1.pdf has 636 pages with the file size of 5908743. The digital document is original with no watermarks.

Manual Information

Brand:3com
Category: Network
Model:3CWXM10A
Type:Manual
Language:English English Manual
File info:PDF / 5.6 Mb / 636 pages
Support:

PDF File Preview

PDF File Information

Title: 3Com Wireless LAN Switch and Controller Configuration Guide
Subject: 3Com Wireless LAN Mobility System
Author: 3Com
Creator: FrameMaker 7.0
Producer: Acrobat Distiller 5.0.5 (Windows)
CreationDate: Thu Apr 27 15:11:06 2006
ModDate: Mon May 1 14:24:41 2006
Tagged: no
Pages: 636
Encrypted: no
Page size: 540 x 648 pts
File size: 5908743 bytes
Optimized: yes
PDF version: 1.3

PDF Bookmark and List of Contents

  • About This Guide

    • Conventions
    • Documentation
    • Documentation Comments
  • Using the Command-Line Interface

    • Overview
    • CLI Conventions
      • Command Prompts
      • Syntax Notation
      • Text Entry Conventions and Allowed Characters
        • MAC Address Notation
        • IP Address and Mask Notation
      • User Globs, MAC Address Globs, and VLAN Globs
        • User Globs
        • MAC Address Globs
        • VLAN Globs
        • Matching Order for Globs
      • Port Lists
      • Virtual LAN Identification
    • Command-Line Editing
      • Keyboard Shortcuts
      • History Buffer
      • Tabs
      • Single-Asterisk (*) Wildcard Character
      • Double-Asterisk (**) Wildcard Characters
    • Using CLI Help
    • Understanding Command Descriptions
  • WX Setup Methods

    • Overview
      • Quick Starts
      • 3Com Wireless Switch Manager
      • CLI
      • Web View
    • How a WX Switch Gets its Configuration
    • Web Quick Start (WXR100 and WX1200 Only)
      • Web Quick Start Parameters
      • Web Quick Start Requirements
      • Accessing the Web Quick Start
    • CLI quickstart Command
      • Quickstart Example
    • Remote WX Configuration
    • Opening the QuickStart Network Plan in 3Com Wireless Switch Manager
  • Configuring AAA for Administrative and Local Access

    • Overview
    • Before You Start
    • About Administrative Access
      • Access Modes
      • Types of Administrative Access
    • First-Time Configuration via the Console
      • Enabling an Administrator
      • Setting the WX Switch Enable Password
        • Setting the WX Enable Password for the First Time
        • 3Com Wireless Switch Manager Enable Password
      • Authenticating at the Console
      • Customizing AAA with “Globs” and Groups
      • Setting User Passwords
      • Adding and Clearing Local Users for Administrative Access
    • Configuring Accounting for Administrative Users
    • Displaying the AAA Configuration
    • Saving the Configuration
    • Administrative AAA Configuration Scenarios
      • Local Authentication
      • Local Authentication for Console Users and RADIUS Authentication for Telnet Users
      • Authentication When RADIUS Servers Do Not Respond
      • Local Override and Backup Local Authentication
  • Configuring and Managing Ports and VLANs

    • Configuring and Managing Ports
      • Setting the Port Type
        • Setting a Port for a Directly Connected MAP
        • Configuring for a Distributed MAP
        • Setting a Port for a Wired Authentication User
        • Clearing a Port
        • Clearing a Distributed MAP
      • Configuring a Port Name
        • Setting a Port Name
        • Removing a Port Name
      • Configuring Interface Preference on a Dual-Interface Gigabit Ethernet Port (WX4400 only)
      • Configuring Port Operating Parameters
        • 10/100 Ports-Autonegotiation and Port Speed
        • Gigabit Ports - Autonegotiation and Flow Control
        • Disabling or Reenabling a Port
        • Disabling or Reenabling Power over Ethernet
        • Resetting a Port
      • Displaying Port Information
        • Displaying Port Configuration and Status
        • Displaying PoE State
        • Displaying Port Statistics
        • Clearing Statistics Counters
        • Monitoring Port Statistics
      • Configuring Load-Sharing Port Groups
        • Load Sharing
        • Link Redundancy
        • Configuring a Port Group
        • Removing a Port Group
        • Displaying Port Group Information
        • Interoperating with Cisco Systems EtherChannel
    • Configuring and Managing VLANs
      • Understanding VLANs in 3Com MSS
        • VLANs, IP Subnets, and IP Addressing
        • Users and VLANs
        • VLAN Names
        • Roaming and VLANs
        • Traffic Forwarding
        • 802.1Q Tagging
        • Tunnel Affinity
      • Configuring a VLAN
        • Creating a VLAN
        • Adding Ports to a VLAN
        • Removing an Entire VLAN or a VLAN Port
      • Changing Tunneling Affinity
      • Restricting Layer 2 Forwarding Among Clients
      • Displaying VLAN Information
    • Managing the Layer 2 Forwarding Database
      • Types of Forwarding Database Entries
      • How Entries Enter the Forwarding Database
      • Displaying Forwarding Database Information
        • Displaying the Size of the Forwarding Database
        • Displaying Forwarding Database Entries
      • Adding an Entry to the Forwarding Database
      • Removing Entries from the Forwarding Database
      • Configuring the Aging Timeout Period
        • Displaying the Aging Timeout Period
        • Changing the Aging Timeout Period
    • Port and VLAN Configuration Scenario
  • Configuring and Managing IP Interfaces and Services

    • MTU Support
    • Configuring and Managing IP Interfaces
      • Adding an IP Interface
        • Statically Configuring an IP Interface
        • Enabling the DHCP Client
      • Disabling or Reenabling an IP Interface
      • Removing an IP Interface
      • Displaying IP Interface Information
    • Configuring the System IP Address
      • Designating the System IP Address
      • Displaying the System IP Address
      • Clearing the System IP Address
    • Configuring and Managing IP Routes
      • Displaying IP Routes
      • Adding a Static Route
      • Removing a Static Route
    • Managing the Management Services
      • Managing SSH
        • Login Timeouts
        • Enabling SSH
        • Adding an SSH User
        • Changing the SSH Service Port Number
        • Managing SSH Server Sessions
      • Managing Telnet
        • Telnet Login Timers
        • Enabling Telnet
        • Adding a Telnet User
        • Displaying Telnet Status
        • Changing the Telnet Service Port Number
        • Resetting the Telnet Service Port Number to Its Default
        • Managing Telnet Server Sessions
      • Managing HTTPS
        • Enabling HTTPS
        • Displaying HTTPS Information
      • Changing the Idle Timeout for CLI Management Sessions
    • Configuring and Managing DNS
      • Enabling or Disabling the DNS Client
      • Configuring DNS Servers
        • Adding a DNS Server
        • Removing a DNS Server
      • Configuring a Default Domain Name
        • Adding the Default Domain Name
        • Removing the Default Domain Name
      • Displaying DNS Server Information
    • Configuring and Managing Aliases
      • Adding an Alias
      • Removing an Alias
      • Displaying Aliases
    • Configuring and Managing Time Parameters
      • Setting the Time Zone
        • Displaying the Time Zone
        • Clearing the Time Zone
      • Configuring the Summertime Period
        • Displaying the Summertime Period
        • Clearing the Summertime Period
      • Statically Configuring the System Time and Date
      • Displaying the Time and Date
      • Configuring and Managing NTP
      • Adding an NTP Server
      • Removing an NTP Server
      • Changing the NTP Update Interval
      • Resetting the Update Interval to the Default
      • Enabling the NTP Client
      • Displaying NTP Information
    • Managing the ARP Table
      • Displaying ARP Table Entries
      • Adding an ARP Entry
      • Changing the Aging Timeout
    • Pinging Another Device
    • Logging In to a Remote Device
    • Tracing a Route
    • IP Interfaces and Services Configuration Scenario
  • Configuring SNMP

    • Overview
    • Configuring SNMP
      • Setting the System Location and Contact Strings
      • Enabling SNMP Versions
      • Configuring Community Strings (SNMPv1 and SNMPv2c Only)
      • Creating a USM User for SNMPv3
        • Command Examples
      • Setting SNMP Security
      • Configuring a Notification Profile
        • Command Examples
      • Configuring a Notification Target
        • Command Examples
      • Enabling the SNMP Service
    • Displaying SNMP Information
      • Displaying SNMP Version and Status Information
      • Displaying the Configured SNMP Community Strings
      • Displaying USM Settings
      • Displaying Notification Profiles
      • Displaying Notification Targets
      • Displaying SNMP Statistics Counters
  • Configuring and Managing Mobility Domain Roaming

    • About the Mobility Domain Feature
    • Configuring a Mobility Domain
      • Configuring the Seed
      • Configuring Member WX Switches on the Seed
      • Configuring a Member
      • Displaying Mobility Domain Status
      • Displaying the Mobility Domain Configuration
      • Clearing a Mobility Domain from a WX Switch
      • Clearing a Mobility Domain Member from a Seed
    • Monitoring the VLANs and Tunnels in a Mobility Domain
      • Displaying Roaming Stations
      • Displaying Roaming VLANs and Their Affinities
      • Displaying Tunnel Information
    • Understanding the Sessions of Roaming Users
      • Requirements for Roaming to Succeed
      • Effects of Timers on Roaming
      • Monitoring Roaming Sessions
    • Mobility Domain Scenario
  • Configuring Network Domains

    • About the Network Domain Feature
      • Network Domain Seed Affinity
    • Configuring a Network Domain
      • Configuring Network Domain Seeds
      • Specifying Network Domain Seed Peers
      • Configuring Network Domain Members
      • Displaying Network Domain Information
      • Clearing Network Domain Configuration from a WX Switch
      • Clearing a Network Domain Seed from a WX Switch
      • Clearing a Network Domain Peer from a Network Domain Seed
      • Clearing Network Domain Seed or Member Configuration from a WX Switch
    • Network Domain Scenario
  • Configuring MAP Access Points

    • MAP Overview
      • Country of Operation
      • Directly Connected MAPs and Distributed MAPs
        • Distributed MAP Network Requirements
        • Distributed MAPs and STP
        • Distributed MAPs and DHCP Option 43
        • MAP Parameters
        • Resiliency and Dual-Homing Options for MAPs
        • MAP Boot Process
        • Session Load Balancing
      • Service Profiles
        • Public and Private SSIDs
        • Encryption
      • Radio Profiles
        • RF AutoTuning
        • Default Radio Profile
        • Radio-Specific Parameters
    • Configuring MAPs
      • Specifying the Country of Operation
      • Configuring an Auto-AP Profile for Automatic MAP Configuration
        • How an Unconfigured MAP Finds a WX Switch To Configure It
        • Configured MAPs Have Precedence Over Unconfigured MAPs
        • Configuring an Auto-AP Profile
      • Configuring MAP Port Parameters
        • Setting the Port Type for a Directly Connected MAP
        • Configuring an Indirectly Connected MAP
        • Clearing a MAP from the Configuration
        • Changing MAP Names
        • Changing Bias
        • Configuring a Load-Balancing Group
        • Disabling or Reenabling Automatic Firmware Upgrades
        • Enabling LED Blink Mode
      • Configuring MAP-WX Security
        • Encryption Key Fingerprint
        • Encryption Options
        • Verifying a MAP’s Fingerprint on a WX Switch
        • Setting the MAP Security Requirement on a WX Switch
        • Fingerprint Log Message
      • Configuring a Service Profile
        • Disabling or Reenabling Encryption for an SSID
        • Disabling or Reenabling Beaconing of an SSID
        • Changing the Fallthru Authentication Type
      • Configuring a Radio Profile
        • Creating a New Profile
        • Changing Radio Parameters
        • Resetting a Radio Profile Parameter to its Default Value
        • Removing a Radio Profile
      • Configuring Radio-Specific Parameters
        • Configuring the Channel and Transmit Power
        • Configuring the External Antenna Model
      • Mapping the Radio Profile to Service Profiles
      • Assigning a Radio Profile and Enabling Radios
    • Disabling or Reenabling Radios
      • Enabling or Disabling Individual Radios
      • Disabling or Reenabling All Radios Using a Profile
      • Resetting a Radio to its Factory Default Settings
      • Restarting a MAP
    • Displaying MAP Information
      • Displaying MAP Configuration Information
      • Displaying Connection Information for Distributed MAPs
      • Displaying a List of Distributed MAPs that Are Not Configured
      • Displaying Active Connection Information for Distributed MAPs
      • Displaying Service Profile Information
      • Displaying Radio Profile Information
      • Displaying MAP Status Information
      • Displaying MAP Statistics Counters
  • Configuring User Encryption

    • Overview
    • Configuring WPA
      • WPA Cipher Suites
      • TKIP Countermeasures
      • WPA Authentication Methods
      • WPA Information Element
      • Client Support
      • Configuring WPA
        • Creating a Service Profile for WPA
        • Enabling WPA
        • Specifying the WPA Cipher Suites
        • Changing the TKIP Countermeasures Timer Value
        • Enabling PSK Authentication
        • Displaying WPA Settings
        • Assigning the Service Profile to Radios and Enabling the Radios
    • Configuring RSN (802.11i)
      • Creating a Service Profile for RSN
      • Enabling RSN
      • Specifying the RSN Cipher Suites
      • Changing the TKIP Countermeasures Timer Value
      • Enabling PSK Authentication
      • Displaying RSN Settings
      • Assigning the Service Profile to Radios and Enabling the Radios
    • Configuring WEP
      • Setting Static WEP Key Values
      • Assigning Static WEP Keys
    • Encryption Configuration Scenarios
      • Enabling WPA with TKIP
      • Enabling Dynamic WEP in a WPA Network
      • Configuring Encryption for MAC Clients
  • Configuring RF AutoTuning

    • Overview
      • Initial Channel and Power Assignment
      • Channel and Power Tuning
        • Power Tuning
        • Channel Tuning
        • Tuning the Transmit Data Rate
      • RF AutoTuning Parameters
    • Changing RF AutoTuning Settings
      • Changing Channel Tuning Settings
        • Disabling or Reenabling Channel Tuning
        • Changing the Channel Tuning Interval
        • Changing the Channel Holddown Interval
      • Changing Power Tuning Settings
        • Enabling Power Tuning
        • Changing the Power Tuning Interval
        • Changing the Power Backoff Interval
        • Changing the Maximum Default Power Allowed On a Radio
        • Changing the Client Retransmission Threshold
      • Changing the Minimum Transmit Data Rate
    • Displaying RF AutoTuning Information
      • Displaying RF AutoTuning Settings
      • Displaying RF Neighbors
      • Displaying RF Attributes
  • Configuring Quality of Service

    • How QoS Works in MSS
      • QoS on the WX Switch
      • QoS on a MAP
    • Displaying QoS Information
      • Displaying CoS Mappings
        • Displaying the Default CoS Mappings
        • Displaying a DSCP-to-CoS Mapping
        • Displaying a CoS-to-DSCP Mapping
      • Displaying the DSCP Table
      • Displaying MAP Forwarding Queue Statistics
    • Changing CoS Mappings
    • Managing WMM
      • Disabling or Reenabling WMM
      • Displaying the WMM State
  • Configuring and Managing Spanning Tree Protocol

    • Overview
    • Enabling the Spanning Tree Protocol
    • Changing Standard Spanning Tree Parameters
      • Bridge Priority
      • Port Cost
      • Port Priority
      • Changing the Bridge Priority
      • Changing STP Port Parameters
        • Changing the STP Port Cost
        • Resetting the STP Port Cost to the Default Value
        • Changing the STP Port Priority
        • Resetting the STP Port Priority to the Default Value
        • Changing the STP Port Priority
        • Resetting the STP Port Priority to the Default Value
      • Changing Spanning Tree Timers
        • Changing the STP Hello Interval
        • Changing the STP Forwarding Delay
        • Changing the STP Maximum Age
    • Configuring and Managing STP Fast Convergence Features
      • Configuring Port Fast Convergence
      • Displaying Port Fast Convergence Information
      • Configuring Backbone Fast Convergence
      • Displaying the Backbone Fast Convergence State
      • Configuring Uplink Fast Convergence
      • Displaying Uplink Fast Convergence Information
    • Displaying Spanning Tree Information
      • Displaying STP Bridge and Port Information
      • Displaying the STP Port Cost on a VLAN Basis
      • Displaying Blocked STP Ports
      • Displaying Spanning Tree Statistics
      • Clearing STP Statistics
    • Spanning Tree Configuration Scenario
  • Configuring and Managing IGMP Snooping

    • Overview
    • Disabling or Reenabling IGMP Snooping
    • Disabling or Reenabling Proxy Reporting
    • Enabling the Pseudo-Querier
    • Changing IGMP Timers
      • Changing the Query Interval
      • Changing the Other-Querier- Present Interval
      • Changing the Query Response Interval
      • Changing the Last Member Query Interval
      • Changing Robustness
    • Enabling Router Solicitation
      • Changing the Router Solicitation Interval
    • Configuring Static Multicast Ports
      • Adding or Removing a Static Multicast Router Port
      • Adding or Removing a Static Multicast Receiver Port
    • Displaying Multicast Information
      • Displaying Multicast Configuration Information and Statistics
        • Displaying Multicast Statistics Only
        • Clearing Multicast Statistics
      • Displaying Multicast Queriers
      • Displaying Multicast Routers
      • Displaying Multicast Receivers
  • Configuring and Managing Security ACLs

    • About Security Access Control Lists
      • Overview of Security ACL Commands
      • Security ACL Filters
    • Creating and Committing a Security ACL
      • Setting a Source IP ACL
        • Wildcard Masks
        • Class of Service
      • Setting an ICMP ACL
      • Setting TCP and UDP ACLs
        • Setting a TCP ACL
        • Setting a UDP ACL
      • Determining the ACE Order
      • Committing a Security ACL
      • Viewing Security ACL Information
        • Viewing the Edit Buffer
        • Viewing Committed Security ACLs
        • Viewing Security ACL Details
        • Displaying Security ACL Hits
      • Clearing Security ACLs
    • Mapping Security ACLs
      • Mapping User-Based Security ACLs
      • Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed MAPs
        • Displaying ACL Maps to Ports, VLANs, and Virtual Ports
        • Clearing a Security ACL Map
    • Modifying a Security ACL
      • Adding Another ACE to a Security ACL
      • Placing One ACE before Another
      • Modifying an Existing Security ACL
      • Clearing Security ACLs from the Edit Buffer
    • Using ACLs to Change CoS
      • Filtering Based on DSCP Values
        • Using the dscp Option
        • Using the precedence and tos Options
    • Enabling Prioritization for Legacy Voice over IP
      • General Guidelines
      • Enabling VoIP Support for TeleSym Packets
      • Enabling SVP Optimization for SpectraLink Phones
        • Known Limitations
        • Configuring a Service Profile for RSN (WPA2)
        • Configuring a Service Profile for WPA
        • Configuring a Radio Profile
        • Configuring a VLAN and AAA for Voice Clients
        • Configuring an ACL to Prioritize Voice Traffic
        • Setting 802.11b/g Radios to 802.11b (for Siemens SpectraLink VoIP Phones only)
        • Disabling RF Auto-Tuning Before Upgrading a SpectraLink Phone
    • Restricting Client-To-Client Forwarding Among IP-Only Clients
    • Security ACL Configuration Scenario
  • Managing Keys and Certificates

    • Why Use Keys and Certificates?
      • Wireless Security through TLS
      • PEAP-MS-CHAP-V2 Security
    • About Keys and Certificates
      • Public Key Infrastructures
      • Public and Private Keys
      • Digital Certificates
      • PKCS #7, PKCS #10, and PKCS #12 Object Files
    • Creating Keys and Certificates
      • Choosing the Appropriate Certificate Installation Method for Your Network
      • Creating Public-Private Key Pairs
      • Generating Self-Signed Certificates
      • Installing a Key Pair and Certificate from a PKCS #12 Object File
      • Creating a CSR and Installing a Certificate from a PKCS #7 Object File
      • Installing a CA’s Own Certificate
    • Displaying Certificate and Key Information
    • Key and Certificate Configuration Scenarios
      • Creating Self-Signed Certificates
      • Installing CA-Signed Certificates from PKCS #12 Object Files
      • Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR) and a PKCS #7 Object File
  • Configuring AAA for Network Users

    • About AAA for Network Users
      • Authentication
        • Authentication Types
        • Authentication Algorithm
        • SSID Name “Any”
        • Last-Resort Processing
        • User Credential Requirements
      • Authorization
      • Accounting
      • Summary of AAA Features
    • AAA Tools for Network Users
      • “Globs” and Groups for Network User Classification
        • Wildcard “Any” for SSID Matching
      • AAA Methods for IEEE 802.1X and Web Network Access
        • AAA Rollover Process
        • Local Override Exception
        • Remote Authentication with Local Backup
      • IEEE 802.1X Extensible Authentication Protocol Types
      • Ways a WX Switch Can Use EAP
      • Effects of Authentication Type on Encryption Method
    • Configuring 802.1X Authentication
      • Configuring EAP Offload
      • Using Pass-Through
      • Authenticating via a Local Database
      • Binding User Authentication to Machine Authentication
        • Authentication Rule Requirements
        • Bonded Auth Period
        • Bonded Auth Configuration Example
        • Displaying Bonded Auth Configuration Information
    • Configuring Authentication and Authorization by MAC Address
      • Adding and Clearing MAC Users and User Groups Locally
        • Adding MAC Users and Groups
        • Clearing MAC Users and Groups
      • Configuring MAC Authentication and Authorization
      • Changing the MAC Authorization Password for RADIUS
    • Configuring Web Portal WebAAA
      • How WebAAA Portal Works
      • WebAAA Requirements and Recommendations
        • WX Switch Requirements
        • WX Switch Recommendations
        • Client NIC Requirements
        • Client Web Browser Recommendations
      • Configuring Web Portal WebAAA
        • Web Portal WebAAA Configuration Example
        • Displaying Session Information for Web Portal WebAAA Users
      • Using a Custom Login Page
        • Copying and Modifying the Web Login Page
        • Custom Login Page Scenario
      • Using Dynamic Fields in WebAAA Redirect URLs
    • Configuring Last-Resort Access
    • Configuring AAA for Users of Third-Party APs
      • Authentication Process for Users of a Third-Party AP
      • Requirements
        • Third-Party AP Requirements
        • WX Switch Requirements
        • RADIUS Server Requirements
      • Configuring Authentication for 802.1X Users of a Third-Party AP with Tagged SSIDs
      • Configuring Authentication for Non-802.1X Users of a Third-Party AP with Tagged SSIDs
      • Configuring Access for Any Users of a Non-Tagged SSID
    • Assigning Authorization Attributes
      • Assigning Attributes to Users and Groups
      • Assigning SSID Default Attributes to a Service Profile
      • Assigning a Security ACL to a User or a Group
        • Assigning a Security ACL Locally
        • Assigning a Security ACL on a RADIUS Server
      • Clearing a Security ACL from a User or Group
      • Assigning Encryption Types to Wireless Users
        • Assigning and Clearing Encryption Types Locally
        • Assigning and Clearing Encryption Types on a RADIUS Server
    • Overriding or Adding Attributes Locally with a Location Policy
      • About the Location Policy
      • How the Location Policy Differs from a Security ACL
      • Setting the Location Policy
        • Applying Security ACLs in a Location Policy Rule
        • Displaying and Positioning Location Policy Rules
      • Clearing Location Policy Rules and Disabling the Location Policy
    • Configuring Accounting for Wireless Network Users
      • Viewing Local Accounting Records
      • Viewing Roaming Accounting Records
    • Displaying the AAA Configuration
    • Avoiding AAA Problems in Configuration Order
      • Using the Wildcard “Any” as the SSID Name in Authentication Rules
      • Using Authentication and Accounting Rules Together
        • Configuration Producing an Incorrect Processing Order
        • Configuration for a Correct Processing Order
    • Configuring a Mobility Profile
    • Network User Configuration Scenarios
      • General Use of Network User Commands
      • Enabling RADIUS Pass-Through Authentication
      • Enabling PEAP-MS-CHAP-V2 Authentication
      • Enabling PEAP-MS-CHAP-V2 Offload
      • Combining EAP Offload with Pass-Through Authentication
      • Overriding AAA-Assigned VLANs
  • Configuring Communication with RADIUS

    • RADIUS Overview
    • Before You Begin
    • Configuring RADIUS Servers
      • Configuring Global RADIUS Defaults
      • Setting the System IP Address as the Source Address
      • Configuring Individual RADIUS Servers
      • Deleting RADIUS Servers
    • Configuring RADIUS Server Groups
      • Creating Server Groups
        • Ordering Server Groups
        • Configuring Load Balancing
        • Adding Members to a Server Group
      • Deleting a Server Group
    • RADIUS and Server Group Configuration Scenario
  • Managing 802.1X on the WX Switch

    • Managing 802.1X on Wired Authentication Ports
      • Enabling and Disabling 802.1X Globally
      • Setting 802.1X Port Control
    • Managing 802.1X Encryption Keys
      • Enabling 802.1X Key Transmission
      • Configuring 802.1X Key Transmission Time Intervals
      • Managing WEP Keys
        • Configuring 802.1X WEP Rekeying
        • Configuring the Interval for WEP Rekeying
    • Setting EAP Retransmission Attempts
    • Managing 802.1X Client Reauthentication
      • Enabling and Disabling 802.1X Reauthentication
      • Setting the Maximum Number of 802.1X Reauthentication Attempts
      • Setting the 802.1X Reauthentication Period
      • Setting the Bonded Authentication Period
    • Managing Other Timers
      • Setting the 802.1X Quiet Period
      • Setting the 802.1X Timeout for an Authorization Server
      • Setting the 802.1X Timeout for a Client
    • Displaying 802.1X Information
      • Viewing 802.1X Clients
      • Viewing the 802.1X Configuration
      • Viewing 802.1X Statistics
  • Managing Sessions

    • About the Session Manager
    • Displaying and Clearing Administrative Sessions
      • Displaying and Clearing All Administrative Sessions
      • Displaying and Clearing an Administrative Console Session
      • Displaying and Clearing Administrative Telnet Sessions
      • Displaying and Clearing Client Telnet Sessions
    • Displaying and Clearing Network Sessions
      • Displaying Verbose Network Session Information
      • Displaying and Clearing Network Sessions by Username
      • Displaying and Clearing Network Sessions by MAC Address
      • Displaying and Clearing Network Sessions by VLAN Name
      • Displaying and Clearing Network Sessions by Session ID
  • Rogue Detection and Countermeasures

    • Overview
    • About Rogues and RF Detection
      • Rogue Access Points and Clients
        • Rogue Classification
        • Rogue Detection Lists
      • RF Detection Scans
        • Dynamic Frequency Selection (DFS)
      • Countermeasures
    • Summary of Rogue Detection Features
    • Configuring Rogue Detection Lists
      • Configuring a Permitted Vendor List
      • Configuring a Permitted SSID List
      • Configuring a Client Black List
      • Configuring an Attack List
      • Configuring an Ignore List
    • Enabling Countermeasures
      • Using On-Demand Countermeasures in a Mobility Domain
    • Disabling or Reenabling Active Scan
    • Enabling MAP Signatures
    • Disabling or Reenabling Logging of Rogues
    • Enabling Rogue and Countermeasures Notifications
    • IDS and DoS Alerts
      • Flood Attacks
      • DoS Attacks
      • Netstumbler and Wellenreiter Applications
      • Wireless Bridge
      • Ad-Hoc Network
      • Weak WEP Key Used by Client
      • Disallowed Devices or SSIDs
      • Displaying Statistics Counters
      • IDS Log Message Examples
    • Displaying RF Detection Information
      • Displaying Rogue Clients
      • Displaying Rogue Detection Counters
      • Displaying SSID or BSSID Information for a Mobility Domain
      • Displaying RF Detect Data
      • Displaying the APs Detected by MAP Radio
      • Displaying Countermeasures Information
  • Managing System Files

    • About System Files
      • Displaying Software Version Information
      • Displaying Boot Information
    • Working with Files
      • Displaying a List of Files
      • Copying a File
      • Using an Image File’s MD5 Checksum To Verify Its Integrity
      • Deleting a File
      • Creating a Subdirectory
      • Removing a Subdirectory
    • Managing Configuration Files
      • Displaying the Running Configuration
      • Saving Configuration Changes
      • Specifying the Configuration File to Use After the Next Reboot
      • Loading a Configuration File
      • Specifying a Backup Configuration File
      • Resetting to the Factory Default Configuration
    • Backing Up and Restoring the System
      • Managing Configuration Changes
      • Backup and Restore Examples
    • Upgrading the System Image
      • Preparing the WX Switch for the Upgrade
      • Upgrading an Individual Switch Using the CLI
        • Upgrade Scenario
      • Command Changes During Upgrade
  • Troubleshooting a WX Switch

    • Fixing Common WX Setup Problems
    • Recovering the System When the Enable Password is Lost
    • Configuring and Managing the System Log
      • Log Message Components
      • Logging Destinations and Levels
      • Using Log Commands
        • Logging to the Log Buffer
        • Logging to the Console
        • Logging Messages to a Syslog Server
        • Setting Telnet Session Defaults
        • Changing the Current Telnet Session Defaults
        • Logging to the Trace Buffer
        • Enabling Mark Messages
        • Saving Trace Messages in a File
        • Displaying the Log Configuration
    • Running Traces
      • Using the Trace Command
        • Tracing Authentication Activity
        • Tracing Session Manager Activity
        • Tracing Authorization Activity
        • Tracing 802.1X Sessions
      • Displaying a Trace
      • Stopping a Trace
      • About Trace Results
      • Displaying Trace Results
      • Copying Trace Results to a Server
      • Clearing the Trace Log
      • List of Trace Areas
    • Using display Commands
      • Viewing VLAN Interfaces
      • Viewing AAA Session Statistics
      • Viewing FDB Information
      • Viewing ARP Information
    • Remotely Monitoring Traffic
      • How Remote Traffic Monitoring Works
        • Using Snoop Filters on Radios That Use Active Scan
        • All Snooped Traffic Is Sent in the Clear
      • Best Practices for Remote Traffic Monitoring
      • Configuring a Snoop Filter
        • Displaying Configured Snoop Filters
        • Editing a Snoop Filter
        • Deleting a Snoop Filter
      • Mapping a Snoop Filter to a Radio
        • Displaying the Snoop Filters Mapped to a Radio
        • Displaying the Snoop Filter Mappings for All Radios
        • Removing Snoop Filter Mappings
      • Enabling or Disabling a Snoop Filter
      • Displaying Remote Traffic Monitoring Statistics
      • Preparing an Observer and Capturing Traffic
    • Capturing System Information and Sending it to Technical Support
      • The display tech-support Command
      • Core Files
      • Debug Messages
      • Sending Information to 3Com Technical Support
  • Enabling and Logging Into Web Manager

    • Enabling HTTPS
    • Logging Into Web Manager
  • Supported RADIUS Attributes

    • Supported Standard and Extended Attributes
    • 3Com Vendor-Specific Attributes
  • Mobility Domain Traffic Ports

    • Traffic Ports
  • DHCP Server

    • How the MSS DHCP Server Works
    • Configuring the DHCP Server
    • Displaying DHCP Server Information
  • Obtaining Support for your Product

    • Register Your Product
    • Purchase Value-Added Services
    • Troubleshoot Online
    • Access Software Downloads
    • Telephone Technical Support and Repair
    • Contact Us
  • Glossary

  • Index

  • Command Index

More User Manuals for 3com 3CWXM10A