This document provides a summary of key features and configuration steps for the Motorola Solutions WiNG 5 Enterprise Controller system. It includes chapters on the web user interface, quick start guide, dashboard, device configuration, wireless configuration, profile configuration, RF domain configuration and security configuration. The quick start guide chapter provides step-by-step instructions for configuring a basic managed wireless local area network using the controller's graphical user interface. It describes tasks such as configuring network access, creating wireless profiles and wireless local area network configurations, as well as associated settings for devices, domains and policies.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains detailed explanations and screenshots to help users understand and configure various aspects of the access point.
Sonic os standard_3_9_administrators_guideAshwani Singh
This document is an administrator's guide for SonicOS Standard 3.9 that provides comprehensive internet security. It contains information about setting up and configuring SonicWALL security appliances, including collecting ISP information, running the setup wizard, registering the appliance, and viewing system status and settings. The guide is organized into sections covering introduction and setup, system configuration and management, and technical reference for features.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
Learn about Implementing Systems Management of IBM PureFlex System.This IBM Redbooks publication introduces IBM PureFlex System and its management devices and appliances. It provides implementation guidelines for managing Linux KVM, IBM PowerVM, VMware vSphere and Microsoft Hyper-V virtualization environments. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains detailed explanations and screenshots to help users understand and configure various aspects of the access point.
Sonic os standard_3_9_administrators_guideAshwani Singh
This document is an administrator's guide for SonicOS Standard 3.9 that provides comprehensive internet security. It contains information about setting up and configuring SonicWALL security appliances, including collecting ISP information, running the setup wizard, registering the appliance, and viewing system status and settings. The guide is organized into sections covering introduction and setup, system configuration and management, and technical reference for features.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
Learn about Implementing Systems Management of IBM PureFlex System.This IBM Redbooks publication introduces IBM PureFlex System and its management devices and appliances. It provides implementation guidelines for managing Linux KVM, IBM PowerVM, VMware vSphere and Microsoft Hyper-V virtualization environments. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
This document provides documentation for a computer software program. It states that the documentation is proprietary and subject to copyright laws. It also limits the ability to copy or distribute the documentation without permission. The documentation is provided "as is" without warranty and the manufacturer disclaims all liability for any loss or damage resulting from the use of the documentation.
This document is a user guide for Motorola's Point-to-Multipoint (PMP) wireless broadband solutions. It covers planning, installation, operation, and specifications for PMP 100, PMP 400, PTP 100, PTP 200, and related products. The guide provides information on network components, frequency bands, product comparisons, antennas, software, and differentiating between components. It aims to help users find information, understand conventions, and provide feedback on the guide.
This document is a user guide for a 450Mbps Wireless N Router model TL-WR945N. It provides instructions on setting up the router by connecting the hardware, accessing the router's interface, and configuring various settings. The guide outlines how to configure the router's network, wireless, security, firewall, and other advanced features when used in standard wireless router mode or access point mode.
This document provides implementation and configuration notes for Backup Recovery and Media Services (BRMS) for Baker Distributing. It details housekeeping tasks, media management procedures, problem determination steps, backup control groups, policies, and recovery planning considerations. Key sections include guidelines for adding media to BRMS inventory, verifying the logical and physical media databases are synchronized, creating pick lists for loading and unloading the media library, and restoring individual IFS objects.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
This document is a user guide for Faronics Power Save that describes how to install, configure, access and generate reports from the software. It provides information on system requirements, an overview of installation and configuration options using the Faronics Core Console interface or manually on a workstation, how to create and apply power plans and policies, and descriptions of various report types that can be generated.
This document provides an overview of HTML, CSS, Bootstrap, JavaScript and jQuery. It covers topics such as basic HTML tags and attributes, CSS selectors and properties, Bootstrap's grid system and components, JavaScript keywords and data types, and how to use jQuery. The document is intended as a reference for learning these web development languages and frameworks.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
The IBM PureFlex System combines no-compromise system designs along with built-in expertise and integrates them into complete, optimized solutions.This IBM Redbooks publication describes IBM PureFlex System and IBM Flex System. It highlights the technology and features of the chassis, compute nodes, management features, and connectivity options. Guidance is provided about every major component, and about networking and storage connectivity. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides instructions for using the CV-22 PC Tool software to program electronic cash registers. It describes how to:
1. Create a new customer database by entering customer details, selecting an ECR model and IPL, and saving the record.
2. Update the File 90 automatically or create a custom ECR program using the Update File 90 button.
3. Set up ECR communication settings like the COM port and baud rate in the ECR Setup screen.
4. Create a new customer database by copying an existing customer's data, receiving a program from the ECR, or entering details from scratch.
This document is the user guide for Faronics Core, which is software for centrally managing and securing computers. It provides an overview of Faronics Core, instructions for installing and configuring the Faronics Core Server and Console, and guidance on using the Faronics Core Console interface to manage and group workstations.
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Advantec Distribution
This white paper discusses solutions for detecting and eliminating rogue wireless networks in enterprises. It provides an overview of different types of rogue devices like rogue access points, soft APs, ad-hoc networks, and accidental associations that pose security risks. The paper evaluates various approaches to detecting rogues and concludes that the AirDefense solution allows enterprises to effectively detect and eliminate all types of rogues through 24x7 centralized wireless and wired monitoring.
The document discusses a new wireless network architecture called WiNG 5 that delivers more network capacity, resiliency, coverage and agility through distributed intelligence. Key points:
- WiNG 5 uses smart, network-aware access points that can directly communicate and route traffic for better performance compared to traditional hub-and-spoke architectures.
- This distributed approach reduces bottlenecks and allows individual transmissions along the most efficient path.
- The network can continue operating even if a wireless controller or switch fails, improving resilience.
- Motorola's solutions are designed to optimize performance when using Motorola mobile devices.
The document discusses preparing a WLAN infrastructure to support voice services. It outlines several key steps:
1) Define voice service requirements such as number of users, areas of coverage, and expected traffic volumes.
2) Ensure the wired network is ready to support voice with features like QoS, PoE, and separate voice VLANs.
3) Design the WLAN for dense, pervasive coverage using tools to accurately model signal propagation. A dual overlay network with separate SSIDs for voice and data is recommended.
The document provides an overview and instructions for an AP 7181 Access Point, including:
- Feature overview of the access point's mesh networking, 802.11n support, security, management, and other capabilities.
- Instructions for hardware installation, including placement, mounting, power and antenna options, and physical connections.
- Details on initial setup and staging of the access point prior to field installation.
The document provides instructions for using the command line interface (CLI) of the Motorola T3 PowerBroadband system. It describes the command hierarchy, types of commands, and conventions for entering commands. Administrative commands are used to configure the system and require admin login, while show commands can be used by any user to view status information. The CLI supports tab completion, command history, and context-sensitive help.
Motorola solutions wing 5.2.2 access point system reference guide (part no. 7...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions WiNG 5.2.2 access point software. It includes chapters on web UI features, quick start, dashboard, device configuration, wireless configuration, security configuration, services configuration, management access, diagnostics, operations, and statistics. The table of contents lists over a dozen chapters that provide details on configuring and using the access point software.
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
This document provides documentation for a computer software program. It states that the documentation is proprietary and subject to copyright laws. It also limits the ability to copy or distribute the documentation without permission. The documentation is provided "as is" without warranty and the manufacturer disclaims all liability for any loss or damage resulting from the use of the documentation.
This document is a user guide for Motorola's Point-to-Multipoint (PMP) wireless broadband solutions. It covers planning, installation, operation, and specifications for PMP 100, PMP 400, PTP 100, PTP 200, and related products. The guide provides information on network components, frequency bands, product comparisons, antennas, software, and differentiating between components. It aims to help users find information, understand conventions, and provide feedback on the guide.
This document is a user guide for a 450Mbps Wireless N Router model TL-WR945N. It provides instructions on setting up the router by connecting the hardware, accessing the router's interface, and configuring various settings. The guide outlines how to configure the router's network, wireless, security, firewall, and other advanced features when used in standard wireless router mode or access point mode.
This document provides implementation and configuration notes for Backup Recovery and Media Services (BRMS) for Baker Distributing. It details housekeeping tasks, media management procedures, problem determination steps, backup control groups, policies, and recovery planning considerations. Key sections include guidelines for adding media to BRMS inventory, verifying the logical and physical media databases are synchronized, creating pick lists for loading and unloading the media library, and restoring individual IFS objects.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
This document is a user guide for Faronics Power Save that describes how to install, configure, access and generate reports from the software. It provides information on system requirements, an overview of installation and configuration options using the Faronics Core Console interface or manually on a workstation, how to create and apply power plans and policies, and descriptions of various report types that can be generated.
This document provides an overview of HTML, CSS, Bootstrap, JavaScript and jQuery. It covers topics such as basic HTML tags and attributes, CSS selectors and properties, Bootstrap's grid system and components, JavaScript keywords and data types, and how to use jQuery. The document is intended as a reference for learning these web development languages and frameworks.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
The IBM PureFlex System combines no-compromise system designs along with built-in expertise and integrates them into complete, optimized solutions.This IBM Redbooks publication describes IBM PureFlex System and IBM Flex System. It highlights the technology and features of the chassis, compute nodes, management features, and connectivity options. Guidance is provided about every major component, and about networking and storage connectivity. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides instructions for using the CV-22 PC Tool software to program electronic cash registers. It describes how to:
1. Create a new customer database by entering customer details, selecting an ECR model and IPL, and saving the record.
2. Update the File 90 automatically or create a custom ECR program using the Update File 90 button.
3. Set up ECR communication settings like the COM port and baud rate in the ECR Setup screen.
4. Create a new customer database by copying an existing customer's data, receiving a program from the ECR, or entering details from scratch.
This document is the user guide for Faronics Core, which is software for centrally managing and securing computers. It provides an overview of Faronics Core, instructions for installing and configuring the Faronics Core Server and Console, and guidance on using the Faronics Core Console interface to manage and group workstations.
Tired of rogues_-_solutions_for_detecting_and_eliminating_rogue_wireless_netw...Advantec Distribution
This white paper discusses solutions for detecting and eliminating rogue wireless networks in enterprises. It provides an overview of different types of rogue devices like rogue access points, soft APs, ad-hoc networks, and accidental associations that pose security risks. The paper evaluates various approaches to detecting rogues and concludes that the AirDefense solution allows enterprises to effectively detect and eliminate all types of rogues through 24x7 centralized wireless and wired monitoring.
The document discusses a new wireless network architecture called WiNG 5 that delivers more network capacity, resiliency, coverage and agility through distributed intelligence. Key points:
- WiNG 5 uses smart, network-aware access points that can directly communicate and route traffic for better performance compared to traditional hub-and-spoke architectures.
- This distributed approach reduces bottlenecks and allows individual transmissions along the most efficient path.
- The network can continue operating even if a wireless controller or switch fails, improving resilience.
- Motorola's solutions are designed to optimize performance when using Motorola mobile devices.
The document discusses preparing a WLAN infrastructure to support voice services. It outlines several key steps:
1) Define voice service requirements such as number of users, areas of coverage, and expected traffic volumes.
2) Ensure the wired network is ready to support voice with features like QoS, PoE, and separate voice VLANs.
3) Design the WLAN for dense, pervasive coverage using tools to accurately model signal propagation. A dual overlay network with separate SSIDs for voice and data is recommended.
The document provides an overview and instructions for an AP 7181 Access Point, including:
- Feature overview of the access point's mesh networking, 802.11n support, security, management, and other capabilities.
- Instructions for hardware installation, including placement, mounting, power and antenna options, and physical connections.
- Details on initial setup and staging of the access point prior to field installation.
The document provides instructions for using the command line interface (CLI) of the Motorola T3 PowerBroadband system. It describes the command hierarchy, types of commands, and conventions for entering commands. Administrative commands are used to configure the system and require admin login, while show commands can be used by any user to view status information. The CLI supports tab completion, command history, and context-sensitive help.
Motorola solutions wing 5.2.2 access point system reference guide (part no. 7...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions WiNG 5.2.2 access point software. It includes chapters on web UI features, quick start, dashboard, device configuration, wireless configuration, security configuration, services configuration, management access, diagnostics, operations, and statistics. The table of contents lists over a dozen chapters that provide details on configuring and using the access point software.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions AP-6511 Access Point. It includes chapters that describe accessing and navigating the web user interface, an initial setup wizard, dashboard for monitoring device health and inventory, configuration of device and wireless settings, and more. The document contains detailed instructions, descriptions, and reference information for configuring and managing the access point via the web interface.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains over 10 chapters and sections covering all aspects of initial setup and management of the AP-6511 access point through the Web UI.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
Product description vital qip next generation v7 2_en_feb09(1)Roy Muy Golfo
VitalQIP is a leading IP management software that provides centralized management of IP addresses, DNS, DHCP, and ENUM. It offers automated IP address assignment, accurate network inventory, flexible user interfaces, redundancy of DNS and DHCP servers, and integration with existing DNS and DHCP environments. The document provides an overview of VitalQIP's capabilities, including its architecture with enterprise server, database, and client components. It describes the user interfaces of the core product, such as the new next-generation web GUI, command line interface, and web services API. The document also outlines many features of VitalQIP related to DNS, DHCP, reporting, user permissions, and high availability.
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business goals. Access lists are a key tool that network administrators can use on Cisco routers to implement various network policies and control packet and route flow. The chapter describes different types of network policies and provides examples of how access lists can be used to implement policies for controlling router resources, packet filtering, and route filtering.
This document provides an overview and introduction to the Data Services Management Console: Administrator Guide. It welcomes the reader to Data Services XI Release 3 and lists the documentation set. It describes how to access the documentation on Windows and UNIX systems as well as from the Business Objects website. Finally, it provides Business Objects' information resources for customer support, consulting, training, and submitting documentation feedback.
The document provides an overview of the TeamViewer remote control software, outlining its key features and functions. It describes how to install TeamViewer, configure it to start automatically with Windows, and explains the differences between running TeamViewer as an application or system service. The document also gives an overview of TeamViewer's licensing options and related downloads.
This document provides an overview of the technical realization of the client/server architecture in SAP R/3 and describes how to perform basic system administration tasks. It covers topics such as starting and stopping the database and SAP instances, monitoring system status, managing background jobs, configuring the update system, and setting up output management. The document also discusses user administration, authorizations, and transport management.
1) The document discusses the Intel 8031 microcontroller architecture, including its central processing unit, input/output ports, timers/counters, serial port, memory organization, and instruction set.
2) It provides details on the 8031's addressing modes, data transfer instructions, arithmetic instructions, and program control instructions like jumps and calls.
3) The document uses examples of real-life projects designed using 8031 microcontrollers, such as a telephone line interface, stepper motor controller, and frequency counter. It also discusses software tools for programming and debugging 8031 projects.
The document is the FortiGate-200 Administration Guide, version 2.80 MR8. It provides instructions for configuring and managing FortiGate-200 units including system settings, network interfaces, firewall policies, VPN configurations, and other security functions. The guide contains chapters on topics such as the web-based manager interface, system monitoring and firmware updates, network and interface settings, DHCP and routing protocols, user and device authentication, antivirus and intrusion prevention settings, and more. It aims to help administrators securely install and effectively manage FortiGate-200 devices.
Ibm web sphere datapower b2b appliance xb60 revealednetmotshop
This document provides an overview of IBM WebSphere DataPower B2B Appliance XB60. It discusses business-to-business integration concepts and technologies. It then describes the XB60 appliance, how it facilitates B2B integration using industry standards, and how data flows through its B2B Gateway service. The document also covers device setup and administrative tasks for the XB60, including initializing the device, defining the base configuration, and configuring domains, groups and users.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
This document provides an overview of the SmartPlant Instrumentation tutorial. The tutorial is divided into sections for system administration, domain administration, and instrument engineering. It guides the user through tasks to create instruments, loops, and associated documentation such as specifications, loop drawings, and wiring diagrams. These tasks include defining supporting data, creating and duplicating loops and tags, performing calculations, generating reports, linking documentation, and customizing views of the data. The tutorial also includes examples of tasks for the system administrator, such as initializing domains and defining users, and for the domain administrator, such as setting up the plant hierarchy and access rights.
This document provides an overview of virtualization technologies and discusses how to set up and configure DB2 on PowerVM, VMware vSphere, and Microsoft Hyper-V. It covers the architectures and features of these virtualization platforms, including PowerVM on Power Systems, VMware vSphere, and Hyper-V. It also provides guidance on installing and configuring DB2 in virtualized environments based on these technologies.
This document provides an overview of IBM's MobileFirst strategy and solutions. It describes IBM's MobileFirst platform, which includes tools for developing, integrating, deploying, managing, securing and testing mobile applications. It also discusses IBM's strategy, software and services for enabling enterprise mobility. Practical scenarios demonstrate how to use IBM Worklight to develop a mobile app and integrate it with backend systems and services.
This document provides an overview and implementation details for IBM Tivoli Monitoring for Network Performance V2.1. It describes the product's architecture including components like the web application, monitor functions, communication methods, and database structure. It then discusses two implementation scenarios: a distributed servers environment and a pure z/OS environment. Finally, it covers steps for installing and configuring the web application on AIX and z/OS mainframes.
This document provides guidance on obtaining certification for IBM Tivoli Netcool/Webtop V2.0. It begins with an overview of IBM's certification program and the objectives covered in the Netcool/Webtop certification exam. The document then details key areas examined in the exam, including planning, installation, configuration, and performance tuning. It provides guidance on preparing for the exam through classroom courses, online resources, and hands-on experience with Netcool/Webtop.
This document provides a 3-sentence summary of a Oracle Web Conferencing Administrator's Guide:
The guide instructs administrators on how to deploy, configure, and manage Oracle Web Conferencing. It covers topics such as installation, configuration of core components and ports, clustering, reports, and sample deployment scenarios. The document is intended to help administrators understand Oracle Web Conferencing functionality and architecture, and provide guidance on common administration tasks.
Similar to Motorola solutions wing 5.3 wireless controller system reference guide (part no. 72 e 159609-01 rev. a) 15960901a (20)
Cambium Networks is an industry leader in point-to-multipoint and point-to-point wireless broadband solutions. They have shipped over 4 million nodes totaling over $1 billion to networks in more than 150 countries. Their ePMP product line provides affordable and scalable wireless access networks through features like GPS synchronization, high scalability and consistent performance, interference mitigation technology, and effective quality of service capabilities.
The VX 9000 virtualized software-based wireless LAN controller combines the power of virtualization with Motorola Solutions' WiNG Controller. It provides centralized management of wireless networks through a single interface with high scalability, flexibility and advanced wireless services. Key features include integrated network security, the advanced WiNG 5 operating system, plug-and-play deployment, simplified licensing and infinite scalability through virtualization. It supports all major hypervisors and public/private clouds for maximum deployment flexibility at low cost.
The NX 7500 integrated services platform provides comprehensive management of up to 2,048 network elements through a single interface. It allows all network infrastructure to intelligently route traffic for maximum speed and throughput without congestion. The NX 7500 offers advanced wireless LAN performance for mid-sized and campus environments with features such as plug-and-play installation, hierarchical management, smart routing, BYOD support, and integrated security services. It provides flexibility and investment protection through modular upgrades.
The document discusses the challenges retailers face in supporting increased wireless applications and next-generation Wi-Fi in stores. It introduces the Motorola AP 8200 Series as a solution that provides high-performance wireless connectivity for customers and staff. The AP 8200 Series allows easy access, security, support for 802.11ac Wi-Fi, bandwidth for applications, and performance for many users. It provides flexibility, a cost-effective upgrade to 802.11ac, and features for security, environmental monitoring, location services, and more.
The document describes the innovative features of the Motorola AP 8222 wireless access point. It has a sleek design suitable for retail, office, and other customer-facing spaces. It provides dual-band 802.11ac and 802.11n wireless connectivity at speeds up to 1.3Gbps. Key features include advanced beamforming, gap-free security, and support for bandwidth-heavy applications like video calling. The access point is centrally managed through Motorola's WiNG 5 networking operating system.
The AP 8163 is a ruggedized outdoor mesh access point designed to withstand extreme weather conditions. It has three radios - two for client access across 2.4GHz and 5GHz bands, and a third radio that can be used for wireless intrusion prevention scanning or dynamic frequency selection to avoid radar interference. The advanced WiNG 5 operating system allows the access points to self-optimize the network for best performance. Key features include powerful antennas for extended range, mesh networking for redundancy, and security features like firewalls and wireless intrusion prevention.
The document describes the features and capabilities of the Motorola AP 8122 3x3 MIMO 802.11n access point. It delivers high throughput to support enterprise applications including voice and HD video using 802.11n technology with standard 802.3af PoE. It has advanced features like load balancing, pre-emptive roaming, and dual band radios to increase network reliability, resilience, and security. The access point also supports advanced wireless capabilities such as voice over wireless, location services, and guest access controls.
The document describes the innovative features of the AP 7532 wireless access point. It provides the highest wireless speeds available with 3x3 MIMO and 256 QAM modulation on both 2.4GHz and 5GHz radios. It has a dual radio 802.11ac/802.11n design that provides a upgrade path to 1.3Gbps 802.11ac speeds while maintaining support for existing devices. It offers various advanced features like load balancing, security, sensor support and quality of service for voice. The access point is designed to deliver maximum performance at a low cost.
The AP 7502 is a dual-band 802.11ac wireless access point designed for installation in small spaces like hotel rooms. It has a compact wall-mount design, supports the latest WiFi standards, and includes features to ensure reliable connectivity even in challenging environments. Setup and management are simplified through zero-touch provisioning and both standalone and controller-based operation modes.
The document describes the innovative features of the AP 7522 wireless access point. It provides dual-band 802.11ac and 802.11n radios for high performance WiFi. It offers internal or external antenna options and can function as both an access point and wireless sensor. The access point provides security, load balancing, and other features to support mission critical applications on the wireless network.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
3. TABLE OF CONTENTS
Chapter 1 Overview
Chapter 2 Web UI Features
2.1 Accessing the Web UI ............................................................................................................................................................. 2-2
2.1.1 Browser and System Requirements .............................................................................................................................. 2-2
2.1.2 Connecting to the Web UI ............................................................................................................................................. 2-2
2.2 Glossary of Icons Used ............................................................................................................................................................ 2-3
2.2.1 Global Icons ................................................................................................................................................................... 2-3
2.2.2 Dialog Box Icons ............................................................................................................................................................ 2-4
2.2.3 Table Icons .................................................................................................................................................................... 2-4
2.2.4 Status Icons ................................................................................................................................................................... 2-5
2.2.5 Configurable Objects ..................................................................................................................................................... 2-5
2.2.6 Configuration Objects ................................................................................................................................................... 2-8
2.2.7 Configuration Operation Icons ...................................................................................................................................... 2-8
2.2.8 Access Type Icons ......................................................................................................................................................... 2-9
2.2.9 Administrative Role Icons ............................................................................................................................................. 2-9
2.2.10 Device Icons .............................................................................................................................................................. 2-10
Chapter 3 Quick Start
3.1 Using the Initial Setup Wizard ................................................................................................................................................ 3-2
3.2 Creating a managed WLAN .................................................................................................................................................. 3-11
3.2.1 Assumptions ................................................................................................................................................................ 3-11
3.2.2 Design ......................................................................................................................................................................... 3-11
3.2.3 Using the Controller GUI to Configure the WLAN ...................................................................................................... 3-12
3.2.3.1 Configuring Access to the GUI Using the GE1 Port .......................................................................................... 3-13
3.2.3.2 Logging into the Controller for the First Time .................................................................................................. 3-15
3.2.3.3 Creating a RF Domain ....................................................................................................................................... 3-16
3.2.3.4 Creating a Wireless Controller Profile ............................................................................................................. 3-22
3.2.3.5 Creating a WLAN Configuration ....................................................................................................................... 3-31
3.2.3.6 Creating an AP Profile ...................................................................................................................................... 3-34
3.2.3.7 Creating a DHCP Server Policy ......................................................................................................................... 3-57
3.2.3.8 Completing and testing the configurations ...................................................................................................... 3-65
4. 4 WiNG 5 System Reference Guide
Chapter 4 Dashboard
4.1 Summary .................................................................................................................................................................................. 4-2
4.1.1 Device Listing ................................................................................................................................................................ 4-2
4.1.2 System Screen ............................................................................................................................................................... 4-3
4.1.2.1 Health .................................................................................................................................................................. 4-3
4.1.2.2 Inventory .............................................................................................................................................................. 4-8
4.2 Network View ........................................................................................................................................................................ 4-12
Chapter 5 Device Configuration
5.1 Basic Configuration .................................................................................................................................................................. 5-3
5.2 Basic Device Configuration ...................................................................................................................................................... 5-5
5.3 License Configuration .............................................................................................................................................................. 5-8
5.4 Assigning Certificates ............................................................................................................................................................ 5-11
5.4.1 Certificate Management ............................................................................................................................................. 5-13
5.4.2 RSA Key Management ................................................................................................................................................ 5-21
5.4.3 Certificate Creation ..................................................................................................................................................... 5-26
5.4.4 Generating a Certificate Signing Request .................................................................................................................. 5-28
5.5 RF Domain Overrides ............................................................................................................................................................. 5-31
5.6 Profile Overrides .................................................................................................................................................................... 5-37
5.6.1 Controller Cluster Configuration Overrides (Controllers Only) .................................................................................... 5-39
5.6.2 Access Point Adoption Overrides (Access Points Only) .............................................................................................. 5-41
5.6.3 Access Point Radio Power Overrides (Access Points Only) ........................................................................................ 5-43
5.6.4 Profile Interface Override Configuration ..................................................................................................................... 5-45
5.6.4.1 Ethernet Port Override Configuration ................................................................................................................ 5-46
5.6.4.2 Virtual Interface Override Configuration ........................................................................................................... 5-54
5.6.4.3 Port Channel Override Configuration ................................................................................................................ 5-59
5.6.4.4 Radio Override Configuration ............................................................................................................................ 5-66
5.6.4.5 WAN Backhaul Override Configuration ............................................................................................................ 5-76
5.6.4.6 PPPoE Override Configuration ........................................................................................................................... 5-79
5.6.5 Overriding a Profile’s Network Configuration ............................................................................................................. 5-82
5.6.5.1 Overriding a Profile’s DNS Configuration ......................................................................................................... 5-82
5.6.5.2 Overriding a Profile’s ARP Configuration .......................................................................................................... 5-84
5.6.5.3 Overriding a Profile’s L2TPV3 Configuration ..................................................................................................... 5-86
5.6.5.4 Overriding a Profile’s Quality of Service (QoS) Configuration .......................................................................... 5-94
5.6.5.5 Overriding a Profile’ Spanning Tree Configuration ........................................................................................... 5-96
5.6.5.6 Overriding a Profile’s Routing Configuration ................................................................................................... 5-99
5.6.5.7 Dynamic Routing (OSPF) .................................................................................................................................. 5-101
5.6.5.8 Overriding a Profile’s Forwarding Database Configuration ............................................................................ 5-111
5.6.5.9 Overriding a Profile’s Bridge VLAN Configuration .......................................................................................... 5-113
5.6.5.10 Overriding a Profile’s Cisco Discovery Protocol Configuration ..................................................................... 5-118
5.6.5.11 Overriding a Profile’s Link Layer Discovery Protocol Configuration .............................................................. 5-120
5.6.5.12 Overriding a Profile’s Miscellaneous Network Configuration ...................................................................... 5-122
5.6.6 Overriding a Profile’s Security Configuration ............................................................................................................ 5-123
5.6.6.1 Overriding a Profile’s General Security Settings ............................................................................................ 5-125
5.6.6.2 Overriding a Profile’s Certificate Revocation List (CRL) Configuration ........................................................... 5-127
5.6.6.3 Overriding a Profile’s ISAKMP Configuration ................................................................................................. 5-128
5.6.6.4 Overriding a Profile’s Transform Set Configuration ........................................................................................ 5-132
5.6.6.5 Overriding a Profile’s VPN Configuration ....................................................................................................... 5-135
5.6.6.6 Overriding a Profile’s NAT Configuration ........................................................................................................ 5-151
5.6.6.7 Overriding a Profile’s Bridge NAT Configuration ............................................................................................. 5-159
11. Table of Contents 11
14.4.24 Captive Portal Statistics ...................................................................................................................................... 14-174
14.4.25 Network Time ...................................................................................................................................................... 14-175
14.4.25.1 Viewing NTP Status .................................................................................................................................. 14-176
14.4.25.2 Viewing NTP Associations ........................................................................................................................ 14-177
14.5 Wireless Client Statistics ................................................................................................................................................ 14-180
14.5.1 Health .................................................................................................................................................................... 14-180
14.5.2 Details ................................................................................................................................................................... 14-183
14.5.3 Traffic .................................................................................................................................................................... 14-185
14.5.4 WMM TSPEC ........................................................................................................................................................ 14-188
Appendix A Customer Support
A.1 Motorola’s Enterprise Mobility Support Center ......................................................................................................................A-1
A.2 Customer Support Web Site ...................................................................................................................................................A-1
A.3 Manuals ..................................................................................................................................................................................A-1
Appendix B Publicly Available Software
B.1 General Information ................................................................................................................................................................ B-1
B.2 Open Source Software Used ................................................................................................................................................... B-1
B.2.1 Wireless Controller ....................................................................................................................................................... B-2
B.2.2 AP650 / AP6532 ............................................................................................................................................................ B-4
B.2.3 AP51xx .......................................................................................................................................................................... B-6
B.2.4 AP7131 .......................................................................................................................................................................... B-6
B.3 OSS Licenses .......................................................................................................................................................................... B-9
B.3.1 GNU General Public License 2.0 ................................................................................................................................... B-9
B.3.2 GNU Lesser General Public License 2.1 ..................................................................................................................... B-13
B.3.3 BSD Style Licenses ..................................................................................................................................................... B-19
B.3.4 MIT License ................................................................................................................................................................. B-19
B.3.5 WU-FTPD License ....................................................................................................................................................... B-20
B.3.6 Open SSL License ....................................................................................................................................................... B-21
B.3.7 ZLIB License ................................................................................................................................................................ B-22
B.3.8 Open LDAP Public License .......................................................................................................................................... B-23
B.3.9 Apache License 2.0 ..................................................................................................................................................... B-23
B.3.10 Drop Bear License ..................................................................................................................................................... B-26
B.3.11 Sun Community Source License ............................................................................................................................... B-27
B.3.12 The Zope Public License Ver.2.0 (ZPL-2.0) ................................................................................................................ B-37
B.3.13 ZLIB / LIB PNG License ............................................................................................................................................. B-38
Appendix C Upgrading From WiNG 4 to WiNG 5
C.1 AP650 ...................................................................................................................................................................................... C-1
C.1.1 Upgrade WiNG 4.x to 5.x .............................................................................................................................................. C-1
C.1.2 Downgrade WiNG 5.x to 4.x ......................................................................................................................................... C-1
C.1.3 AP650 Connectivity in WiNG 5.x .................................................................................................................................. C-1
C.2 AP7131 / AP71xx ..................................................................................................................................................................... C-2
C.2.1 Upgrade WiNG 4.x to 5.x .............................................................................................................................................. C-2
C.2.2 Downgrade 5.x (WiNG) to 4.x (APn) ............................................................................................................................. C-2
C.2.3 Migration Files .............................................................................................................................................................. C-2
C.2.4 Recovery of a Pre-4.1.1-18R Access Point .................................................................................................................... C-2
C.2.5 AP7131 / 7131N Connectivity in WiNG 5.x .................................................................................................................. C-3
12. 12 WiNG 5 System Reference Guide
C.2.6 Configuration Restoration .............................................................................................................................................C-3
C.2.7 WiNG 5.2 Minimum Requirements ...............................................................................................................................C-3
C.3 Controllers ...............................................................................................................................................................................C-4
C.3.1 Upgrade WiNG 4.x to 5.x ..............................................................................................................................................C-4
C.3.2 Migrating WiNG 4.x Configuration File to 5.2 Configuration File ................................................................................C-4
C.3.3 Downgrade WiNG 5.x to 4.x .........................................................................................................................................C-4
C.3.4 WiNG 5.2 Minimum Requirements ...............................................................................................................................C-4
C.4 AP Discovery Tool ....................................................................................................................................................................C-5
C.4.1 AP Discovery Tool Installation .......................................................................................................................................C-5
C.4.2 Using the AP Discovery Tool .......................................................................................................................................C-10
13. ABOUT THIS GUIDE
This guide provides information about using WiNG 5.3 on the Motorola Solutions Wireless Services Controller Family. The
Wireless Solutions Controller Family is comprised of RFS4000, RFS6000, RFS7000 and NX9000 Series models.
NOTE: Screens and windows pictured in this guide are samples and can differ from
actual screens.
Documentation Set
The documentation set for the Motorola Solutions Wireless Services Controllers is partitioned into the following guides
to provide information for specific user needs.
• Installation Guides - Each controller has a unique Installation Guide which describes the basic hardware setup and
configuration required to transition to more advanced configuration of the wireless controllers.
• Motorola Solutions WING 5 Access Point System Reference Guide - Describes the configuration of either a Standalone
AP or Virtual Controller AP using the access point’s initial setup wizard and resident WING 5 access point specific
software, go to http://supportcentral.motorola.com/support/product/manuals.do
• Motorola Solutions WING 5 Enterprise System Reference Guide (this guide) - Describes the configuration of a
Dependent mode AP using the WING 5 controller software. For information on managing a dependent mode AP in a
controller managed network.
• Motorola Solutions Wireless Services CLI Reference - Describes the Command Line Interface (CLI) and Management
Information Base (MIB) commands used to configure the Motorola Solutions Wireless Services Controllers.
14. 2-2 WiNG 5 System Reference Guide
Document Conventions
The following conventions are used in this document to draw your attention to important information:
NOTE: Indicate tips or special requirements.
Controller Note: Indicates caveats unique to a RFS4000, RFS6000, RFS7000 or NX9000
series wireless service controller.
CAUTION: Indicates conditions that can cause equipment damage or data loss.
!
WARNING! Indicates a condition or procedure that could result in personal injury or
equipment damage.
Notational Conventions
The following additional notational conventions are used in this document:
• GUI text is used to highlight the following:
• Screen names
• Menu items
• Button names on a screen.
• Bullets (•) indicate:
• Action items
• Lists of alternatives
• Lists of required steps that are not necessarily sequential
• Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
15. CHAPTER 1 OVERVIEW
Motorola Solutions’ family of wireless controllers with the 802.11n Access Points enable the centralized distribution of
high performance, secure and resilient wireless voice and data services to remote locations with the scalability required
to meet the needs of large distributed enterprises.
A Motorola Solutions RFS family controller provides a single platform capable of delivering wireless voice and data inside
and outside the enterprise for small, medium and large enterprise deployments. Improve operational efficiency and reduce
the cost of mobility with a powerful comprehensive feature set including adaptive AP, which delivers unmatched
performance, security, reliability and scalability to enable networks for business mobility at a low TCO.
Wireless controllers provide local centralized management and control of 802.11n Access Points and the WING 5 APs
provide the necessary core switching and routing to eliminate additional routing and switching infrastructure.
802.11n is the next generation WLAN standard that provides improved performance and coverage compared with previous
802.11 specifications. 802.11n provides enhancements to support throughput up to 450 Mbps. With these enhancements
Motorola Solutions' next generation 802.11n Access Points offer client data-rates of up to 300Mbps.
A WiNG 5 managed network uses 802.11n Access Points and peer controllers to adapt to the dynamic circumstances of
their deployment environment. The WiNG 5 architecture provides a customized site-specific deployment, supporting the
best path and routes based on the user, location, the application and the best route available (both wireless and wired).
A WiNG managed network assures end-to-end quality, reliability and security without latency and performance
degradation. A WiNG 5 managed network supports rapid application delivery, mixed-media application optimization and
quality assurance.
Deploying a new Motorola Solutions WiNG 5 network does not require the replacement of an existing Motorola Solutions
wireless infrastructure. WiNG 5 enables the simultaneous use of existing architectures from Motorola Solutions and other
vendors, even if those other architectures are centralized models. A wireless network administrator can retain and
optimize legacy infrastructure while evolving to WiNG 5 as required. Adaptive Access Points can operate in a dependent
environment and are field-upgradable to WiNG 5. Controllers can be upgraded to the WiNG 5 operating system with ease.
The Motorola Solutions WiNG 5 architecture is designed for 802.11n networking. It leverages the best aspects of
independent and dependent architectures to create a smart network that meets the connectivity, quality and security
needs of each user deployment and their application requirements, based on the availability of network resources,
including wired networks.
By distributing intelligence and control between the wireless controllers and Access Points, a WiNG 5 managed network
can route data directly using the best path, as determined by factors including the user, the location, the application and
available wireless and wired resources. As a result, the additional load placed on the wired network from 802.11n is
significantly reduced, as traffic does not require an unnecessary backhaul to a central controller.
16. 1-2 WiNG 5 System Reference Guide
Within a WiNG 5 managed network, up to 80% of the network traffic can remain on the wireless mesh, and never
touch the wired network, so the 802.11n load impact on the wired network is negligible. In addition, latency and
associated costs are reduced while reliability and scalability are increased. A WiNG 5 managed network enables the
creation of dynamic wireless traffic flows, so any bottleneck is avoided, and the destination is reached without
latency or performance degradation. This behavior delivers a significantly better quality of experience for the end
user.
The same distributed intelligence enables more resilience and survivability, since the Access Points keep users
connected and traffic flowing with full QoS, security and mobility even if the connection to the wireless controller is
interrupted due to a wired network or backhaul problem.
Even when the network is fully operational, outside RF interference sources or unbalanced wireless network loading
can be automatically corrected by the WiNG 5 Smart RF system. Smart RF senses interference or potential client
connectivity problems and makes the required changes to channel and Access Point radio power while minimizing the
impact to latency sensitive applications like VoIP. Using Smart RF, the managed network can continuously adjust
Access Point power and channel assignments for self-recovery if an AP fails or a coverage hole is detected.
Additionally, integrated Access Point sensors in conjunction with AirDefense Network Assurance alerts
administrators of interference and network coverage problems, which shortens response times and boosts overall
reliability and availability of the WiNG 5 managed network.
Network traffic optimization protects WiNG 5 managed networks from broadcast storms and minimizes congestion
on the wired network. WiNG 5 networks provide VLAN load balancing, WAN traffic shaping and optimizations in
dynamic host configuration protocol (DHCP) responses and Internet group management protocol (IGMP) snooping for
multicast traffic flows in wired and wireless networks. Thus, users benefit from an extremely reliable network that
adapts to meet their needs and delivers mixed-media applications.
Firmware and configuration updates are supported within the managed network, from one Access Point to another,
over the air or wire, and can be centrally managed by the controller. Controllers no longer need to push firmware and
configurations to each individual Access Point, reducing unnecessary network congestion.
WiNG 5 uses remote Authentication Dial-in User Service (RADIUS) synchronization capabilities between the core and
the access layer. If the central authentication mechanism is not available, users can authenticate using the controller
local RADIUS resources, and continue network support with secure access.
17. CHAPTER 2 WEB UI FEATURES
WiNG software contains a Web UI allowing network administrators to manage and view Motorola Solutions Wireless
controller settings, configuration and status. This Graphical User Interface (GUI) allows full control of all managed
features.
Wireless controllers also include a Command Line Interface (CLI) for managing and viewing settings, configuration and
status. For more information on the command line interface and a full list of available commands, see the Motorola
Solutions Wireless Services Controller CLI Reference Guide available at
http://supportcentral.motorola.com/support/product/manuals.do.
For information on how to access and use the controller Web UI, see:
• Accessing the Web UI
• Glossary of Icons Used
18. 2-2 WiNG 5 System Reference Guide
2.1 Accessing the Web UI
Motorola Solutions wireless controllers use a UI accessed using any supported Web browser on a client connected
to the subnet the Web UI is configured on.
2.1.1 Browser and System Requirements
To access the UI, a browser supporting Flash Player 10 is recommended. The system accessing the GUI should have
a minimum of 512Mb or RAM for the UI to display and function properly. The WiNG UI is based on Flex, and does not
use Java as its underlying framework.
The following browsers have been validated with the WiNG Web UI:
• Firefox 3.6
• Internet Explorer 7.x
• Internet Explorer 8.x
NOTE: Throughout the Web UI leading and trailing spaces are not allowed in any text
fields. In addition, the “?” character is also not supported in text fields.
2.1.2 Connecting to the Web UI
1. Connect one end of an Ethernet cable to any of the five LAN ports on the front of the RFS4011 and connect the
other end to a computer with a working Web browser.
2. Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the connected port. Set a
subnet / network mask of 255.255.255.0.
3. Once the computer has an IP address, point the Web broswer to: https://192.168.0.1/ and the following login
screen will display.
Figure 2-1 Web UI Login Screen
4. Enter the default username admin in the Username field.
5. Enter the default password motorola in the Password field.
6. Click the Login button to load the management interface.
7. If this is the first time the UI has been accessed, a dialogue displays to begin an initial setup wizard. For more
information on using the initial setup wizard see Using the Initial Setup Wizard on page 3-2.
19. Web UI Features 2-3
2.2 Glossary of Icons Used
The UI uses a number of icons used to interact with the system, gather information, and obtain status for the entities
managed by the system. This chapter is a compendium of the icons used. This chapter is organized as follows:
• Global Icons
• Dialog Box Icons
• Table Icons
• Status Icons
• Configurable Objects
• Configuration Objects
• Configuration Operation Icons
• Access Type Icons
• Administrative Role Icons
• Device Icons
2.2.1 Global Icons
Glossary of Icons Used
This section lists global icons available throughout the controller interface.
Logoff – Select this icon to log out of the managed system. This icon is always
available and is located at the top right corner of the UI.
Add – Select this icon to add a row in a table. When selected, a new row is created
in the table or a dialog box displays where you can enter values for a particular list.
Delete – Select this icon to remove a row from a table. When selected, the
selected row is deleted.
More Information – Select this icon to display a pop up with supplementary
information that may be available for an item.
Trash – Select this icon to remove a row from a table. When selected, the row is
immediately deleted.
20. 2-4 WiNG 5 System Reference Guide
Create new policy – Select this icon to create a new policy. Policies define
different configuration parameters that can be applied to individual device
configurations, device profiles and RF Domains.
Edit policy – Select this icon to edit an existing policy. To edit a policy, select a
policy and this icon.
2.2.2 Dialog Box Icons
Glossary of Icons Used
These icons indicate the current state of various controls in a dialog. These icons enables you to gather, at a glance,
the status of all the controls in a dialog. The absence of any of these icons next to a control indicates the value in that
control has not been modified from its last saved configuration.
Entry Updated – Indicates a value has been modified from its last saved
configuration.
Entry Update – States that an override has been applied to a device’s profile
configuration.
Mandatory Field – Indicates this control value is a mandatory configuration
item. You will not be allowed to proceed further without providing all
mandatory values in this dialog.
Error in Entry – Indicates there is an error in a value entered in this control. A
small red popup provides a likely cause of the error.
2.2.3 Table Icons
Glossary of Icons Used
The following two override icons are status indicators for transactions:
Table Row Overridden – Indicates a change (profile configuration override)
has been made to a table row and the change will not be implemented until
saved. This icon represents a change from this device’s profile assigned
configuration.
Table Row Added – Indicates a new row has been added to a table and the
change is not implemented until saved. This icon represents a change from
this device’s profile assigned configuration.
21. Web UI Features 2-5
2.2.4 Status Icons
Glossary of Icons Used
These icons indicate device status, operations on the wireless controller, or any other action that requires a status
returned to the user.
Fatal Error – States there is an error causing a managed device to stop
functioning.
Error – Indicates an error exits requiring intervention. A managed action has
failed, but the error is not system wide.
Warning – States a particular action has completed, but errors were detected
that did not prevent the process from completing. Intervention might still be
required to resolve subsequent warnings.
Success – Indicates everything is well within the managed network or a
process has completed successfully without error.
Information – This icon always precedes information displayed to the user.
This may either be a message displaying progress for a particular process, or
just be a message from the system.
2.2.5 Configurable Objects
Glossary of Icons Used
These icons represent configurable items within the controller’s UI.
Device Configuration – Represents a configuration file supporting a device
category (AP, Wireless Controller etc.).
Provisioning Policy – Represents a provisioning policy. Adoption policies are
a set of configuration parameters that define how APs and wireless clients
are adopted by a controller.
Critical Resource Policy – States a critical resource policy has been applied.
Critical resources are resources whose availability is essential to the
managed network. If any of these resources is unavailable, an administrator
is notified.
Wireless LANs – States an action impacting a managed WLAN has occurred.
22. 2-6 WiNG 5 System Reference Guide
WLAN QoS Policy – States a quality of service policy (QoS) configuration has
been impacted.
Radio QoS Policy – Indicates a radio’s QoS configuration has been impacted.
AAA Policy – Indicates an Authentication, Authorization and Accounting
(AAA) policy has been impacted. AAA policies define RADIUS authentication
and accounting parameters.
Association ACL – Indicates an Access Control List (ACL) configuration has
been impacted. An ACL is a set of configuration parameters either allowing
or denying access to managed resources.
Smart RF Policy – States a Smart RF policy has been impacted. Smart RF
enables neighboring APs to take over for an AP if it becomes unavailable. This
is accomplished by increasing the power of radios on nearby APs to cover the
hole created by the non-functioning AP.
Profile – States a device profile configuration has been impacted. A profile is
a collection of configuration parameters used to configure a device or a
feature.
Bridging Policy – Indicates a bridging policy configuration has been impacted.
A Bridging Policy defines which VLANs are bridged, and how local VLANs are
bridged between the wired and wireless sides of the managed network.
RF Domain – States an RF Domain configuration has been impacted.
Firewall Policy – Indicates a firewall policy has been impacted. Firewalls
provide a barrier that prevents unauthorized access to resources while
allowing authorized access to external and internal controller resources.
IP Firewall Rules – Indicates an IP firewall rule has been applied. An IP based
firewall rule implements restrictions based on the IP address in a received
packet.
MAC Firewall Rules – States a MAC based firewall rule has been applied. A
MAC based firewall rule implements firewall restrictions based on the MAC
address in a received packet.
Wireless Client Role – Indicates a wireless client role has been applied to a
managed client. The role could be either sensor or client.
23. Web UI Features 2-7
WIPS Policy – States the conditions of a WIPS policy have been invoked.
WIPS prevents unauthorized access to the managed network by checking for
(and removing) rogue APs and wireless clients.
Advanced WIPS Policy – States the conditions of an advanced WIPS policy
have been invoked.
Device Categorization – Indicates a device categorization policy has been
applied. This is used by the intrusion prevention system to categorize APs or
wireless clients as either sanctioned or unsanctioned devices. This enables
devices to bypass the intrusion prevention system.
Captive Portal – States a captive portal is being applied. Captive portal is
used to provide hotspot services to wireless clients.
DNS Whitelist – A DNS whitelist is used in conjunction with captive portal to
provide hotspot services to wireless clients.
DHCP Server Policy – Indicates a DHCP server policy is being applied. DHCP
provides IP addresses to wireless clients. A DHCP server policy configures
how DHCP provides IP addresses.
RADIUS Group – Indicates the configuration of RADIUS group has been
defined and applied. A RADIUS group is a collection of RADIUS users with the
same set of permissions.
RADIUS User Pools – States a RADIUS user pool has been applied. RADIUS
user pools are a set of IP addresses that can be assigned to an authenticated
RADIUS user.
RADIUS Server Policy – Indicates a RADIUS server policy has been applied. A
RADIUS server policy is a set of configuration attributes used when a RADIUS
server is configured for AAA.
Management Policy – Indicates a management policy has been applied.
Management policies configure access control, authentication, traps and
administrator permissions.
24. 2-8 WiNG 5 System Reference Guide
2.2.6 Configuration Objects
Glossary of Icons Used
These configuration icons are used to define the following:
Configuration – Indicates an item capable of being configured by a controller
interface.
View Events / Event History – Defines a list of events. Click this icon to view
events or view the event history.
Core Snapshots – Indicates a core snapshot has been generated. A core
snapshot is a file that records status when a process fails on the wireless
controller.
Panic Snapshots – Indicates a panic snapshot has been generated. A panic
snapshot is a file that records statu when the wireless controller fails without
recovery.
UI Debugging – Select this icon/link to view current NETCONF messages.
View UI Logs – Select this icon/link to view the different logs generated by
the UI, FLEX and the error logs.
2.2.7 Configuration Operation Icons
Glossary of Icons Used
The following operations icons are used to define configuration operations:
Revert – When selected, any changes made after the last saved configuration
are restored back to the last saved configuration.
Commit – When selected, all changes made to the configuration are written
to the system. Once committed, changes cannot be reverted.
Save – When selected, changes are saved to the configuration.