
Dell PowerConnect W-AirWave 7.5 | Configuration Guide | v
Profiles > IDS > General ..........................................................................................................81
Profiles > IDS > Signature Matching.....................................................................................83
Profiles > IDS > Signature Matching > Signature...............................................................84
Profiles > IDS > Denial of Service..........................................................................................84
Profiles > IDS > Denial of Service > Rate Threshold..........................................................87
Profiles > IDS > Impersonation ..............................................................................................88
Profiles > IDS > Unauthorized Device...................................................................................89
Profiles > Mesh.........................................................................................................................92
Profiles > Mesh > Cluster........................................................................................................93
Profiles > Mesh > Radio .......................................................................................................... 94
Profiles > Mesh > Radio > Mesh HT SSID............................................................................96
Profiles > Mobility Switch .......................................................................................................98
Profiles > Mobility Switch > IGMP Snooping.......................................................................98
Profiles > Mobility Switch > Ethernet Link ...........................................................................99
Profiles > Mobility Switch > Port Switching ......................................................................100
Profiles > Mobility Switch > VLAN.......................................................................................100
Profiles > QoS..........................................................................................................................101
Profiles > QoS > Traffic Management.................................................................................102
Profiles > QoS > VoIP Call Admission Control ...................................................................102
Profiles > QoS > WMM Traffic Management....................................................................104
Profiles > RF............................................................................................................................. 105
Profiles > RF > 802.11a/g Radio ............................................................................................ 106
Profiles > RF > 802.11a/g Radio > AM Scanning................................................................110
Profiles > RF > 802.11a/g Radio > ARM ...............................................................................110
Profiles > RF > 802.11a/g Radio > HT Radio........................................................................114
Profiles > RF > 802.11a/g Radio > Spectrum.......................................................................114
Profiles > RF > Event Thresholds ......................................................................................... 115
Profiles > RF > Optimization ..................................................................................................117
Profiles > SSID ........................................................................................................................119
Profiles > SSID ........................................................................................................................119
Profiles > SSID > EDCA AP ...................................................................................................123
Profiles > SSID > EDCA Station............................................................................................126
Profiles > SSID > HT SSID.....................................................................................................129
Profiles > SSID > 802.11K ...................................................................................................... 130
Security ............................................................................................................................................131
Security > User Roles ............................................................................................................ 132
Security > User Roles > BW Contracts...............................................................................135
Security > User Roles > VPN Dialers ..................................................................................136
Security > Policies..................................................................................................................139
Security > Policies > Destinations.......................................................................................140
Security > Policies > Services..............................................................................................141
Security > Server Groups......................................................................................................142
Server Groups Page Overview.....................................................................................142
Supported Servers .........................................................................................................143
Adding a New Server Group ........................................................................................143
Security > Server Groups > LDAP........................................................................................145
Security > Server Groups > RADIUS ...................................................................................146
Security > Server Groups > TACACS ..................................................................................147
Security > Server Groups > Internal....................................................................................147
Security > Server Groups > XML API..................................................................................148
Security > Server Groups > RFC 3576..................................................................................149
Security > Server Groups > Windows.................................................................................150
Security > TACACS Accounting...........................................................................................150
Security > Time Ranges.........................................................................................................151
Security > User Rules ............................................................................................................ 152
Local Config of SNMP Management...........................................................................................152
Advanced Services ........................................................................................................................154