Dell PowerConnect W-AirWave 7.5 | Configuration Guide | v
Profiles > IDS > General .......................................................................................................... 81
Profiles > IDS > Signature Matching.....................................................................................83
Profiles > IDS > Signature Matching > Signature...............................................................84
Profiles > IDS > Denial of Service..........................................................................................84
Profiles > IDS > Denial of Service > Rate Threshold..........................................................87
Profiles > IDS > Impersonation ..............................................................................................88
Profiles > IDS > Unauthorized Device................................................................................... 89
Profiles > Mesh.........................................................................................................................92
Profiles > Mesh > Cluster........................................................................................................ 93
Profiles > Mesh > Radio ..........................................................................................................94
Profiles > Mesh > Radio > Mesh HT SSID............................................................................ 96
Profiles > Mobility Switch .......................................................................................................98
Profiles > Mobility Switch > IGMP Snooping.......................................................................98
Profiles > Mobility Switch > Ethernet Link ........................................................................... 99
Profiles > Mobility Switch > Port Switching ...................................................................... 100
Profiles > Mobility Switch > VLAN.......................................................................................100
Profiles > QoS..........................................................................................................................101
Profiles > QoS > Traffic Management.................................................................................102
Profiles > QoS > VoIP Call Admission Control ...................................................................102
Profiles > QoS > WMM Traffic Management....................................................................104
Profiles > RF.............................................................................................................................105
Profiles > RF > 802.11a/g Radio ............................................................................................ 106
Profiles > RF > 802.11a/g Radio > AM Scanning ................................................................ 110
Profiles > RF > 802.11a/g Radio > ARM ...............................................................................110
Profiles > RF > 802.11a/g Radio > HT Radio........................................................................ 114
Profiles > RF > 802.11a/g Radio > Spectrum.......................................................................114
Profiles > RF > Event Thresholds .........................................................................................115
Profiles > RF > Optimization ..................................................................................................117
Profiles > SSID ........................................................................................................................119
Profiles > SSID ........................................................................................................................119
Profiles > SSID > EDCA AP ...................................................................................................123
Profiles > SSID > EDCA Station............................................................................................ 126
Profiles > SSID > HT SSID..................................................................................................... 129
Profiles > SSID > 802.11K ......................................................................................................130
Security ............................................................................................................................................131
Security > User Roles ............................................................................................................132
Security > User Roles > BW Contracts...............................................................................135
Security > User Roles > VPN Dialers .................................................................................. 136
Security > Policies..................................................................................................................139
Security > Policies > Destinations.......................................................................................140
Security > Policies > Services.............................................................................................. 141
Security > Server Groups......................................................................................................142
Server Groups Page Overview.....................................................................................142
Supported Servers .........................................................................................................143
Adding a New Server Group ........................................................................................143
Security > Server Groups > LDAP........................................................................................145
Security > Server Groups > RADIUS ................................................................................... 146
Security > Server Groups > TACACS ..................................................................................147
Security > Server Groups > Internal....................................................................................147
Security > Server Groups > XML API..................................................................................148
Security > Server Groups > RFC 3576..................................................................................149
Security > Server Groups > Windows.................................................................................150
Security > TACACS Accounting...........................................................................................150
Security > Time Ranges.........................................................................................................151
Security > User Rules ............................................................................................................152
Local Config of SNMP Management...........................................................................................152
Advanced Services ........................................................................................................................154