User Manual
Page 3
WS2000 Network Architecture The WS2000 brings enterprise mobility and secure wired and wireless networking to power access ports and points Java™ web-based graphical user interface; supports URL Blacklist; command line interface (CLI) Flexible management options; complimentary or...hot spots Provides secure public access - trusted host provisioning; keyword analysis in defining access policies URL filtering Provides complete control over which websites workers can access; URL Whitelist; Motorola RF Management Suite (RFMS); Active/standby configuration Robust network...
WS2000 Network Architecture The WS2000 brings enterprise mobility and secure wired and wireless networking to power access ports and points Java™ web-based graphical user interface; supports URL Blacklist; command line interface (CLI) Flexible management options; complimentary or...hot spots Provides secure public access - trusted host provisioning; keyword analysis in defining access policies URL filtering Provides complete control over which websites workers can access; URL Whitelist; Motorola RF Management Suite (RFMS); Active/standby configuration Robust network...
Reference Guide
Page 89
... Wireless LAN Security The WS 2000 Wireless Switch allows the administrator to set the type and level of allowing WLANs to answer the broadcast ESS is to disallow the Access Port from becoming members of rules that are associated with a private, corporate network.... MU-to prevent intruders from broadcasting its ESSID in a customer environment, such as a "hot spot." instead, they control communication from the WAN; In the Network Configuration --> Wireless --> --> Security screen, the administrator can communicate through the WLAN. 5.3.1 Selecting the Authentication Method...
... Wireless LAN Security The WS 2000 Wireless Switch allows the administrator to set the type and level of allowing WLANs to answer the broadcast ESS is to disallow the Access Port from becoming members of rules that are associated with a private, corporate network.... MU-to prevent intruders from broadcasting its ESSID in a customer environment, such as a "hot spot." instead, they control communication from the WAN; In the Network Configuration --> Wireless --> --> Security screen, the administrator can communicate through the WLAN. 5.3.1 Selecting the Authentication Method...
Reference Guide
Page 112
To use the default username click the 5-30 WS2000 Wireless Switch System Reference Guide To set up Port Authentication for all adopted AP 300 Access Ports: 1. In the Username field, specify a 802.1x username for all AP 300 Access Ports adopted by the switch.
To use the default username click the 5-30 WS2000 Wireless Switch System Reference Guide To set up Port Authentication for all adopted AP 300 Access Ports: 1. In the Username field, specify a 802.1x username for all AP 300 Access Ports adopted by the switch.