3Com WX2200 3CRWX220095A Switch User Manual


 
712 INDEX
other-querier-present interval, configuring 371
proxy reporting 370
pseudo-querier 370
querier, displaying 375
query interval 370
query interval, configuring 371
query response interval 370
query response interval, configuring 371
robustness value 371
robustness value, configuring 371
router solicitation 372
statistics 374
timers 370
ignore list 579
image file 599
boot information 601
calculating checksum 606
upgrading 616
info logging level 625
information element 288
informs, SNMP 144
input filters, reassigning 502
interfering device 568
Internet Control Message Protocol (ICMP) ACLs 383
Internet Group Management Protocol. See IGMP
snooping
internet support 668
interval, WEP rekey 535
Intrusion Detection System (IDS) 584
ad-hoc networks 586
DoS attacks 585
flood attacks 585
log messages 587
Netstumbler 586
weak WEP keys 587
Wellenreiter 586
wireless bridges 586
invalid certificate, troubleshooting 620
IP ACLs 380
IP addresses
aliases 123
configuring 104
conventions for entry and display 29
disabling 107
displaying 107
removing 107
subnet masks for, notation conventions 29
system IP address 108
verifying 132
wildcard masks for, in security ACLs 382
IP interface, adding 104
IP interfaces, configuration scenario 135
IP phones 401
IP routes 108
default 111
displaying 110
static 111
tracing 133
K
key pair, public-private 421
key transmission
enabling and disabling 533
time intervals 533
keyboard shortcuts for command entry 33
keys
802.1X WEP rekeying 534
public-private pair, creating 421
static WEP 301
transmission of 802.1X key information 533
Knowledgebase 667
L
last member query interval 371
configuring 371
last-resort username, passwords are invalid 59
LEDs, MAP blink mode 229
license keys 668
list formats for command entry 32
load balancing, RADIUS server groups 526
load-balancing, RF load 267
load-sharing port groups 85
displaying 87
EtherChannel interoperability 87
local AAA method 443
local accounting records 505
local authentication
802.1X, configuring 450
configuration scenario 62
console users, scenario 62
defined 447
local override and backup authentication,
scenario 64
local database 59
assigning encryption types in 496
assigning security ACLs in 494
clearing users from 59
local facility, for log messages sent to a server 628
local override 52, 443
local packet switching, map configuration 252
location policy
compared to a security ACL 500
configuration scenario 516
configuring 501