H3C Technologies H3C WA2600 Series WLAN Access Points User Manual
Page 7
ii
6 WLAN RRM Configuration ........................................................................................................................6-1
Overview .................................................................................................................................................6-1
Configuration Task list.............................................................................................................................6-1
Configuring Data Transmission Rates ....................................................................................................6-2
Configuring 802.11n Rates..............................................................................................................6-2
Configuring Power Constraint .................................................................................................................6-3
Prerequisites....................................................................................................................................6-3
Configuring Power Constraint .........................................................................................................6-3
Enabling 802.11g Protection...................................................................................................................6-4
Displaying and Maintaining WLAN RRM ................................................................................................6-4
7 WLAN IDS Configuration ..........................................................................................................................7-1
WLAN IDS Overview...............................................................................................................................7-1
Terminology.....................................................................................................................................7-1
WLAN IDS IPS ................................................................................................................................7-2
Configuring IDS Attack Detection ...........................................................................................................7-3
Configuring IDS Attack Detection....................................................................................................7-3
Frame Filtering ........................................................................................................................................7-3
Overview..........................................................................................................................................7-3
Configuring WIDS-Frame Filtering..........................................................................................................7-4
Configuring Static White and Black Lists.........................................................................................7-5
Configuring Dynamic Blacklist Feature ...........................................................................................7-5
8 WLAN QoS Configuration .........................................................................................................................8-1
WLAN QoS Overview..............................................................................................................................8-1
Terminology.....................................................................................................................................8-1
WMM Protocol Overview .................................................................................................................8-2
Protocols and Standards .................................................................................................................8-4
WMM Configuration ................................................................................................................................8-4
Configuration Prerequisites .............................................................................................................8-4
Configuring WMM............................................................................................................................8-4
Displaying and Maintaining WMM...........................................................................................................8-6
WMM Configuration Examples ...............................................................................................................8-6
WMM Basic Configuration ...............................................................................................................8-6
Troubleshooting ......................................................................................................................................8-8
SVP or CAC Configuration Failure ..................................................................................................8-8
9 WDS Configuration....................................................................................................................................9-1
Introduction to WDS ................................................................................................................................9-1
Advantages of WDS ........................................................................................................................9-1