Enterasys Networks 802.11 Network Card User Manual


 
Index-3
Index
console port
Access Point security 2-19
configuring for security 5-28
connecting a device B-1
description 4-5
infrastructure network 5-7
password 5-28
point-to-multipoint network 5-17
point-to-point network 5-12
security 5-28
tips for using B-3
used with VLAN 5-42
console port (R2)
connecting a device B-1
infrastructure network 5-6
point-to-multipoint network 5-16
point-to-point network 5-7, 5-11
security 2-19
tips for using B-3
console port password (Access Point)
description 2-19
console port password (RoamAbout R2)
description 2-19
counters
AP 2000 7-12–7-13
AP Classic 7-12–7-13
overview 7-11
PC Card 7-14–7-16
RADIUS 6-11
RoamAbout R2 7-17–7-18
Coverage area
definition 1-6
determining 3-2
overlap 3-5
size by transmit speed 3-3, 3-7, 3-8
using Site Monitor 6-5
CSMA/CA protocol 2-9
D
data corruption 6-15
Data Link layer 1-2
Data throughput efficiency
description 2-8
DECnet End Node Hello filter 5-45
DECnet filter 5-45
Delivery Traffic Indication Message
See DTIM
Deny Non-Encrypted Data 5-25, 7-16
DHCP
description 5-19
modifying with console port 5-21
modifying with R2 console port 5-20
Diagnose Card 6-9
Directional antenna 1-18, 6-7
Discover 4-4
Distances
ad-hoc network 3-8
infrastructure network 3-3
LAN-to-LAN 3-7
DTIM
description 2-11
modifying 5-22
Dynamic address learning 1-3
Dynamic VLAN 2-25
E
Encryption
ASCII to HEX conversion C-1
configuring 5-25
counter 7-13, 7-16
description 2-13
Endpoint AP
description 1-10
Endpoint Bridge mode
See Point-to-Point
Error logs 7-18
Ethernet Speed 5-6, 5-11, 5-16
Extensible Authentication Protocol (EAP) 2-15