This document provides a summary of features and configuration steps for the Motorola Solutions WiNG 5 Enterprise Controller. It includes chapters that describe the web user interface, provide a quick start guide for initial setup and configuration of a managed wireless LAN, and explain how to configure devices, profiles, licenses, certificates and other settings. The quick start guide walks through configuring access to the GUI, creating a RF domain, wireless profiles, WLAN configuration, access point profiles and a DHCP server policy to complete and test a basic network configuration.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains detailed explanations and screenshots to help users understand and configure various aspects of the access point.
Sonic os standard_3_9_administrators_guideAshwani Singh
This document is an administrator's guide for SonicOS Standard 3.9 that provides comprehensive internet security. It contains information about setting up and configuring SonicWALL security appliances, including collecting ISP information, running the setup wizard, registering the appliance, and viewing system status and settings. The guide is organized into sections covering introduction and setup, system configuration and management, and technical reference for features.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
Learn about Implementing Systems Management of IBM PureFlex System.This IBM Redbooks publication introduces IBM PureFlex System and its management devices and appliances. It provides implementation guidelines for managing Linux KVM, IBM PowerVM, VMware vSphere and Microsoft Hyper-V virtualization environments. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains detailed explanations and screenshots to help users understand and configure various aspects of the access point.
Sonic os standard_3_9_administrators_guideAshwani Singh
This document is an administrator's guide for SonicOS Standard 3.9 that provides comprehensive internet security. It contains information about setting up and configuring SonicWALL security appliances, including collecting ISP information, running the setup wizard, registering the appliance, and viewing system status and settings. The guide is organized into sections covering introduction and setup, system configuration and management, and technical reference for features.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document is the manual for Greenbone Security Manager version 4. It provides information on installing and configuring the Greenbone Security Manager and its components. The manual covers system administration topics like network configuration, user management, and maintenance functions. It also introduces the Greenbone Security Manager graphical user interface and concepts.
Learn about Implementing Systems Management of IBM PureFlex System.This IBM Redbooks publication introduces IBM PureFlex System and its management devices and appliances. It provides implementation guidelines for managing Linux KVM, IBM PowerVM, VMware vSphere and Microsoft Hyper-V virtualization environments. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business policies on networks. Access lists are a key tool that network administrators can use on Cisco routers to implement these policies by controlling router resources, filtering packets, and filtering routing information. The chapter describes different types of network policies and provides an overview of how access lists can be used to achieve policy goals related to security, robustness, and business needs.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
This document provides documentation for a computer software program. It states that the documentation is proprietary and subject to copyright laws. It also limits the ability to copy or distribute the documentation without permission. The documentation is provided "as is" without warranty and the manufacturer disclaims all liability for any loss or damage resulting from the use of the documentation.
This document is a user guide for Motorola's Point-to-Multipoint (PMP) wireless broadband solutions. It covers planning, installation, operation, and specifications for PMP 100, PMP 400, PTP 100, PTP 200, and related products. The guide provides information on network components, frequency bands, product comparisons, antennas, software, and differentiating between components. It aims to help users find information, understand conventions, and provide feedback on the guide.
This document is a user guide for a 450Mbps Wireless N Router model TL-WR945N. It provides instructions on setting up the router by connecting the hardware, accessing the router's interface, and configuring various settings. The guide outlines how to configure the router's network, wireless, security, firewall, and other advanced features when used in standard wireless router mode or access point mode.
This document provides implementation and configuration notes for Backup Recovery and Media Services (BRMS) for Baker Distributing. It details housekeeping tasks, media management procedures, problem determination steps, backup control groups, policies, and recovery planning considerations. Key sections include guidelines for adding media to BRMS inventory, verifying the logical and physical media databases are synchronized, creating pick lists for loading and unloading the media library, and restoring individual IFS objects.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
This document is a user guide for Faronics Power Save that describes how to install, configure, access and generate reports from the software. It provides information on system requirements, an overview of installation and configuration options using the Faronics Core Console interface or manually on a workstation, how to create and apply power plans and policies, and descriptions of various report types that can be generated.
This document provides an overview of HTML, CSS, Bootstrap, JavaScript and jQuery. It covers topics such as basic HTML tags and attributes, CSS selectors and properties, Bootstrap's grid system and components, JavaScript keywords and data types, and how to use jQuery. The document is intended as a reference for learning these web development languages and frameworks.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides instructions for using the CV-22 PC Tool software to program electronic cash registers. It describes how to:
1. Create a new customer database by entering customer details, selecting an ECR model and IPL, and saving the record.
2. Update the File 90 automatically or create a custom ECR program using the Update File 90 button.
3. Set up ECR communication settings like the COM port and baud rate in the ECR Setup screen.
4. Create a new customer database by copying an existing customer's data, receiving a program from the ECR, or entering details from scratch.
The IBM PureFlex System combines no-compromise system designs along with built-in expertise and integrates them into complete, optimized solutions.This IBM Redbooks publication describes IBM PureFlex System and IBM Flex System. It highlights the technology and features of the chassis, compute nodes, management features, and connectivity options. Guidance is provided about every major component, and about networking and storage connectivity. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document is the user guide for Faronics Core, which is software for centrally managing and securing computers. It provides an overview of Faronics Core, instructions for installing and configuring the Faronics Core Server and Console, and guidance on using the Faronics Core Console interface to manage and group workstations.
Motorola solutions wing 5.2.2 access point system reference guide (part no. 7...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions WiNG 5.2.2 access point software. It includes chapters on web UI features, quick start, dashboard, device configuration, wireless configuration, security configuration, services configuration, management access, diagnostics, operations, and statistics. The table of contents lists over a dozen chapters that provide details on configuring and using the access point software.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions AP-6511 Access Point. It includes chapters that describe accessing and navigating the web user interface, an initial setup wizard, dashboard for monitoring device health and inventory, configuration of device and wireless settings, and more. The document contains detailed instructions, descriptions, and reference information for configuring and managing the access point via the web interface.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains over 10 chapters and sections covering all aspects of initial setup and management of the AP-6511 access point through the Web UI.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
Product description vital qip next generation v7 2_en_feb09(1)Roy Muy Golfo
VitalQIP is a leading IP management software that provides centralized management of IP addresses, DNS, DHCP, and ENUM. It offers automated IP address assignment, accurate network inventory, flexible user interfaces, redundancy of DNS and DHCP servers, and integration with existing DNS and DHCP environments. The document provides an overview of VitalQIP's capabilities, including its architecture with enterprise server, database, and client components. It describes the user interfaces of the core product, such as the new next-generation web GUI, command line interface, and web services API. The document also outlines many features of VitalQIP related to DNS, DHCP, reporting, user permissions, and high availability.
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business goals. Access lists are a key tool that network administrators can use on Cisco routers to implement various network policies and control packet and route flow. The chapter describes different types of network policies and provides examples of how access lists can be used to implement policies for controlling router resources, packet filtering, and route filtering.
This document provides instructions for implementing IBM SmartCloud Entry on an IBM PureFlex System. It discusses installing and configuring the necessary IBM PureFlex System hardware including Flex System Manager, networking, storage, and compute nodes. It then covers installing and configuring VMware ESXi on the x86 compute nodes, the VMware vCenter Server, and data stores. Finally, it outlines installing and configuring IBM SmartCloud Entry and workload management.
The IBM Flex System p260 and p460 Compute Nodes are IBM Power Systems servers optimized for virtualization, performance, and efficiency. The nodes support IBM AIX, IBM i, or Linux operating environments, and are designed to run various workloads in IBM PureFlex System. This IBM Redbooks publication is a comprehensive guide to IBM PureFlex System and the Power Systems compute nodes. We introduce the offerings and describe the compute nodes in detail. We then describe planning and implementation steps and go through some of the key the management features of the IBM Flex System Manager management node. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document provides an overview of the configuration and advanced operation capabilities of the OMNI 6000/3000 flow computer firmware revisions 22.74 and 26.74. It describes how to configure physical inputs and outputs, meter stations, meter runs, temperature, pressure, density, products, batches, and other parameters using the keypad in program mode. It also covers user-programmable functions including Boolean flags, variables, and display screens. Finally, it details the flow equations and algorithms used to calculate flow rates and properties for liquid hydrocarbons in US customary and SI metric units.
This document provides documentation for a computer software program. It states that the documentation is proprietary and subject to copyright laws. It also limits the ability to copy or distribute the documentation without permission. The documentation is provided "as is" without warranty and the manufacturer disclaims all liability for any loss or damage resulting from the use of the documentation.
This document is a user guide for Motorola's Point-to-Multipoint (PMP) wireless broadband solutions. It covers planning, installation, operation, and specifications for PMP 100, PMP 400, PTP 100, PTP 200, and related products. The guide provides information on network components, frequency bands, product comparisons, antennas, software, and differentiating between components. It aims to help users find information, understand conventions, and provide feedback on the guide.
This document is a user guide for a 450Mbps Wireless N Router model TL-WR945N. It provides instructions on setting up the router by connecting the hardware, accessing the router's interface, and configuring various settings. The guide outlines how to configure the router's network, wireless, security, firewall, and other advanced features when used in standard wireless router mode or access point mode.
This document provides implementation and configuration notes for Backup Recovery and Media Services (BRMS) for Baker Distributing. It details housekeeping tasks, media management procedures, problem determination steps, backup control groups, policies, and recovery planning considerations. Key sections include guidelines for adding media to BRMS inventory, verifying the logical and physical media databases are synchronized, creating pick lists for loading and unloading the media library, and restoring individual IFS objects.
The document provides an introduction to artificial intelligence, including:
- A brief history of AI from the 1980s "AI winter" period of failed projects through to recent advances enabled by improved hardware and new research areas like machine learning.
- Knowledge representation and reasoning, rule engines, hybrid reasoning systems, and expert systems are introduced as key concepts in AI.
- The advantages of using a rule engine are discussed, as well as when rule engines are appropriate versus other approaches like scripting engines. The Rete algorithm, which is commonly used in rule engines, is also introduced.
This document provides an overview of the FortiManager system including key features, documentation resources, and basic configuration instructions. It summarizes the new features introduced in version 4.0 MR3 including improvements to global policies, administrative domains, installation wizards, policy usability, FortiToken support, management models, licensing, and the web-based manager. It also describes the FortiManager management module and its role in centrally managing FortiGate devices and their configurations.
This document is a user guide for Faronics Power Save that describes how to install, configure, access and generate reports from the software. It provides information on system requirements, an overview of installation and configuration options using the Faronics Core Console interface or manually on a workstation, how to create and apply power plans and policies, and descriptions of various report types that can be generated.
This document provides an overview of HTML, CSS, Bootstrap, JavaScript and jQuery. It covers topics such as basic HTML tags and attributes, CSS selectors and properties, Bootstrap's grid system and components, JavaScript keywords and data types, and how to use jQuery. The document is intended as a reference for learning these web development languages and frameworks.
This document is a study guide for the IBM Tivoli Access Manager for e-business 6.0 certification. It provides an overview of the certification program and prerequisites. It also lists the test objectives that candidates need to understand to pass the exam. Additionally, it recommends educational resources like courses and documentation to help candidates prepare.
This document provides instructions for using the CV-22 PC Tool software to program electronic cash registers. It describes how to:
1. Create a new customer database by entering customer details, selecting an ECR model and IPL, and saving the record.
2. Update the File 90 automatically or create a custom ECR program using the Update File 90 button.
3. Set up ECR communication settings like the COM port and baud rate in the ECR Setup screen.
4. Create a new customer database by copying an existing customer's data, receiving a program from the ECR, or entering details from scratch.
The IBM PureFlex System combines no-compromise system designs along with built-in expertise and integrates them into complete, optimized solutions.This IBM Redbooks publication describes IBM PureFlex System and IBM Flex System. It highlights the technology and features of the chassis, compute nodes, management features, and connectivity options. Guidance is provided about every major component, and about networking and storage connectivity. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
This document is the user guide for Faronics Core, which is software for centrally managing and securing computers. It provides an overview of Faronics Core, instructions for installing and configuring the Faronics Core Server and Console, and guidance on using the Faronics Core Console interface to manage and group workstations.
Motorola solutions wing 5.2.2 access point system reference guide (part no. 7...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions WiNG 5.2.2 access point software. It includes chapters on web UI features, quick start, dashboard, device configuration, wireless configuration, security configuration, services configuration, management access, diagnostics, operations, and statistics. The table of contents lists over a dozen chapters that provide details on configuring and using the access point software.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a system reference guide for the Motorola Solutions AP-6511 Access Point. It includes chapters that describe accessing and navigating the web user interface, an initial setup wizard, dashboard for monitoring device health and inventory, configuration of device and wireless settings, and more. The document contains detailed instructions, descriptions, and reference information for configuring and managing the access point via the web interface.
Motorola solutions ap 6511 access point system reference guide (part no. 72 e...Advantec Distribution
This document provides a reference guide for the Motorola Solutions AP-6511 Access Point. It includes information on accessing and navigating the web user interface (Web UI), initial device setup using the setup wizard, dashboard overview, device configuration including profiles, wireless configuration, and more. The document contains over 10 chapters and sections covering all aspects of initial setup and management of the AP-6511 access point through the Web UI.
This document provides an administrator manual for Atoll version 3.1.0. It discusses installing and configuring Atoll and its components, setting up distributed calculation servers, managing licenses, and working with Atoll databases. The manual is divided into several sections covering topics such as supported technologies, installation, license management, database management, and more.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
Product description vital qip next generation v7 2_en_feb09(1)Roy Muy Golfo
VitalQIP is a leading IP management software that provides centralized management of IP addresses, DNS, DHCP, and ENUM. It offers automated IP address assignment, accurate network inventory, flexible user interfaces, redundancy of DNS and DHCP servers, and integration with existing DNS and DHCP environments. The document provides an overview of VitalQIP's capabilities, including its architecture with enterprise server, database, and client components. It describes the user interfaces of the core product, such as the new next-generation web GUI, command line interface, and web services API. The document also outlines many features of VitalQIP related to DNS, DHCP, reporting, user permissions, and high availability.
This chapter introduces network policies and Cisco access lists. Network policies are needed to implement security, robustness, and business goals. Access lists are a key tool that network administrators can use on Cisco routers to implement various network policies and control packet and route flow. The chapter describes different types of network policies and provides examples of how access lists can be used to implement policies for controlling router resources, packet filtering, and route filtering.
This document provides an overview and introduction to the Data Services Management Console: Administrator Guide. It welcomes the reader to Data Services XI Release 3 and lists the documentation set. It describes how to access the documentation on Windows and UNIX systems as well as from the Business Objects website. Finally, it provides Business Objects' information resources for customer support, consulting, training, and submitting documentation feedback.
The document provides an overview of the TeamViewer remote control software, outlining its key features and functions. It describes how to install TeamViewer, configure it to start automatically with Windows, and explains the differences between running TeamViewer as an application or system service. The document also gives an overview of TeamViewer's licensing options and related downloads.
This document provides an overview of the technical realization of the client/server architecture in SAP R/3 and describes how to perform basic system administration tasks. It covers topics such as starting and stopping the database and SAP instances, monitoring system status, managing background jobs, configuring the update system, and setting up output management. The document also discusses user administration, authorizations, and transport management.
1) The document discusses the Intel 8031 microcontroller architecture, including its central processing unit, input/output ports, timers/counters, serial port, memory organization, and instruction set.
2) It provides details on the 8031's addressing modes, data transfer instructions, arithmetic instructions, and program control instructions like jumps and calls.
3) The document uses examples of real-life projects designed using 8031 microcontrollers, such as a telephone line interface, stepper motor controller, and frequency counter. It also discusses software tools for programming and debugging 8031 projects.
The document is the FortiGate-200 Administration Guide, version 2.80 MR8. It provides instructions for configuring and managing FortiGate-200 units including system settings, network interfaces, firewall policies, VPN configurations, and other security functions. The guide contains chapters on topics such as the web-based manager interface, system monitoring and firmware updates, network and interface settings, DHCP and routing protocols, user and device authentication, antivirus and intrusion prevention settings, and more. It aims to help administrators securely install and effectively manage FortiGate-200 devices.
Ibm web sphere datapower b2b appliance xb60 revealednetmotshop
This document provides an overview of IBM WebSphere DataPower B2B Appliance XB60. It discusses business-to-business integration concepts and technologies. It then describes the XB60 appliance, how it facilitates B2B integration using industry standards, and how data flows through its B2B Gateway service. The document also covers device setup and administrative tasks for the XB60, including initializing the device, defining the base configuration, and configuring domains, groups and users.
This document provides an overview and guide for using HSPcomplete, a hosting automation solution that allows hosting service providers to manage infrastructure, billing, sales channels, and e-commerce through a single system. It describes HSPcomplete's advantages like integrated billing and credit card processing, virtual private server management, and domain registration. Hardware, software, and user requirements for HSPcomplete deployment are also outlined.
This document provides an overview of the SmartPlant Instrumentation tutorial. The tutorial is divided into sections for system administration, domain administration, and instrument engineering. It guides the user through tasks to create instruments, loops, and associated documentation such as specifications, loop drawings, and wiring diagrams. These tasks include defining supporting data, creating and duplicating loops and tags, performing calculations, generating reports, linking documentation, and customizing views of the data. The tutorial also includes examples of tasks for the system administrator, such as initializing domains and defining users, and for the domain administrator, such as setting up the plant hierarchy and access rights.
This document provides an overview of virtualization technologies and discusses how to set up and configure DB2 on PowerVM, VMware vSphere, and Microsoft Hyper-V. It covers the architectures and features of these virtualization platforms, including PowerVM on Power Systems, VMware vSphere, and Hyper-V. It also provides guidance on installing and configuring DB2 in virtualized environments based on these technologies.
This document provides an overview of IBM's MobileFirst strategy and solutions. It describes IBM's MobileFirst platform, which includes tools for developing, integrating, deploying, managing, securing and testing mobile applications. It also discusses IBM's strategy, software and services for enabling enterprise mobility. Practical scenarios demonstrate how to use IBM Worklight to develop a mobile app and integrate it with backend systems and services.
This document provides an overview and implementation details for IBM Tivoli Monitoring for Network Performance V2.1. It describes the product's architecture including components like the web application, monitor functions, communication methods, and database structure. It then discusses two implementation scenarios: a distributed servers environment and a pure z/OS environment. Finally, it covers steps for installing and configuring the web application on AIX and z/OS mainframes.
This document provides guidance on obtaining certification for IBM Tivoli Netcool/Webtop V2.0. It begins with an overview of IBM's certification program and the objectives covered in the Netcool/Webtop certification exam. The document then details key areas examined in the exam, including planning, installation, configuration, and performance tuning. It provides guidance on preparing for the exam through classroom courses, online resources, and hands-on experience with Netcool/Webtop.
This document provides a 3-sentence summary of a Oracle Web Conferencing Administrator's Guide:
The guide instructs administrators on how to deploy, configure, and manage Oracle Web Conferencing. It covers topics such as installation, configuration of core components and ports, clustering, reports, and sample deployment scenarios. The document is intended to help administrators understand Oracle Web Conferencing functionality and architecture, and provide guidance on common administration tasks.
Similar to Motorola solutions wing 5.3 wireless controller system reference guide (part no. 72 e 159609-01 rev. a) 15960901a (20)
Cambium Networks is an industry leader in point-to-multipoint and point-to-point wireless broadband solutions. They have shipped over 4 million nodes totaling over $1 billion to networks in more than 150 countries. Their ePMP product line provides affordable and scalable wireless access networks through features like GPS synchronization, high scalability and consistent performance, interference mitigation technology, and effective quality of service capabilities.
The VX 9000 virtualized software-based wireless LAN controller combines the power of virtualization with Motorola Solutions' WiNG Controller. It provides centralized management of wireless networks through a single interface with high scalability, flexibility and advanced wireless services. Key features include integrated network security, the advanced WiNG 5 operating system, plug-and-play deployment, simplified licensing and infinite scalability through virtualization. It supports all major hypervisors and public/private clouds for maximum deployment flexibility at low cost.
The NX 7500 integrated services platform provides comprehensive management of up to 2,048 network elements through a single interface. It allows all network infrastructure to intelligently route traffic for maximum speed and throughput without congestion. The NX 7500 offers advanced wireless LAN performance for mid-sized and campus environments with features such as plug-and-play installation, hierarchical management, smart routing, BYOD support, and integrated security services. It provides flexibility and investment protection through modular upgrades.
The document discusses the challenges retailers face in supporting increased wireless applications and next-generation Wi-Fi in stores. It introduces the Motorola AP 8200 Series as a solution that provides high-performance wireless connectivity for customers and staff. The AP 8200 Series allows easy access, security, support for 802.11ac Wi-Fi, bandwidth for applications, and performance for many users. It provides flexibility, a cost-effective upgrade to 802.11ac, and features for security, environmental monitoring, location services, and more.
The document describes the innovative features of the Motorola AP 8222 wireless access point. It has a sleek design suitable for retail, office, and other customer-facing spaces. It provides dual-band 802.11ac and 802.11n wireless connectivity at speeds up to 1.3Gbps. Key features include advanced beamforming, gap-free security, and support for bandwidth-heavy applications like video calling. The access point is centrally managed through Motorola's WiNG 5 networking operating system.
The AP 8163 is a ruggedized outdoor mesh access point designed to withstand extreme weather conditions. It has three radios - two for client access across 2.4GHz and 5GHz bands, and a third radio that can be used for wireless intrusion prevention scanning or dynamic frequency selection to avoid radar interference. The advanced WiNG 5 operating system allows the access points to self-optimize the network for best performance. Key features include powerful antennas for extended range, mesh networking for redundancy, and security features like firewalls and wireless intrusion prevention.
The document describes the features and capabilities of the Motorola AP 8122 3x3 MIMO 802.11n access point. It delivers high throughput to support enterprise applications including voice and HD video using 802.11n technology with standard 802.3af PoE. It has advanced features like load balancing, pre-emptive roaming, and dual band radios to increase network reliability, resilience, and security. The access point also supports advanced wireless capabilities such as voice over wireless, location services, and guest access controls.
The document describes the innovative features of the AP 7532 wireless access point. It provides the highest wireless speeds available with 3x3 MIMO and 256 QAM modulation on both 2.4GHz and 5GHz radios. It has a dual radio 802.11ac/802.11n design that provides a upgrade path to 1.3Gbps 802.11ac speeds while maintaining support for existing devices. It offers various advanced features like load balancing, security, sensor support and quality of service for voice. The access point is designed to deliver maximum performance at a low cost.
The AP 7502 is a dual-band 802.11ac wireless access point designed for installation in small spaces like hotel rooms. It has a compact wall-mount design, supports the latest WiFi standards, and includes features to ensure reliable connectivity even in challenging environments. Setup and management are simplified through zero-touch provisioning and both standalone and controller-based operation modes.
The document describes the innovative features of the AP 7522 wireless access point. It provides dual-band 802.11ac and 802.11n radios for high performance WiFi. It offers internal or external antenna options and can function as both an access point and wireless sensor. The access point provides security, load balancing, and other features to support mission critical applications on the wireless network.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
3. TABLE OF CONTENTS
Chapter 1 Overview
Chapter 2 Web UI Features
2.1 Accessing the Web UI ............................................................................................................................................................. 2-2
2.1.1 Browser and System Requirements .............................................................................................................................. 2-2
2.1.2 Connecting to the Web UI ............................................................................................................................................. 2-2
2.2 Glossary of Icons Used ............................................................................................................................................................ 2-3
2.2.1 Global Icons ................................................................................................................................................................... 2-3
2.2.2 Dialog Box Icons ............................................................................................................................................................ 2-4
2.2.3 Table Icons .................................................................................................................................................................... 2-4
2.2.4 Status Icons ................................................................................................................................................................... 2-5
2.2.5 Configurable Objects ..................................................................................................................................................... 2-5
2.2.6 Configuration Objects ................................................................................................................................................... 2-8
2.2.7 Configuration Operation Icons ...................................................................................................................................... 2-8
2.2.8 Access Type Icons ......................................................................................................................................................... 2-9
2.2.9 Administrative Role Icons ............................................................................................................................................. 2-9
2.2.10 Device Icons .............................................................................................................................................................. 2-10
Chapter 3 Quick Start
3.1 Using the Initial Setup Wizard ................................................................................................................................................ 3-2
3.2 Creating a managed WLAN .................................................................................................................................................. 3-11
3.2.1 Assumptions ................................................................................................................................................................ 3-11
3.2.2 Design ......................................................................................................................................................................... 3-11
3.2.3 Using the Controller GUI to Configure the WLAN ...................................................................................................... 3-12
3.2.3.1 Configuring Access to the GUI Using the GE1 Port .......................................................................................... 3-13
3.2.3.2 Logging into the Controller for the First Time .................................................................................................. 3-15
3.2.3.3 Creating a RF Domain ....................................................................................................................................... 3-16
3.2.3.4 Creating a Wireless Controller Profile ............................................................................................................. 3-22
3.2.3.5 Creating a WLAN Configuration ....................................................................................................................... 3-31
3.2.3.6 Creating an AP Profile ...................................................................................................................................... 3-34
3.2.3.7 Creating a DHCP Server Policy ......................................................................................................................... 3-57
3.2.3.8 Completing and testing the configurations ...................................................................................................... 3-65
4. 4 WiNG 5 System Reference Guide
Chapter 4 Dashboard
4.1 Summary .................................................................................................................................................................................. 4-2
4.1.1 Device Listing ................................................................................................................................................................ 4-2
4.1.2 System Screen ............................................................................................................................................................... 4-3
4.1.2.1 Health .................................................................................................................................................................. 4-3
4.1.2.2 Inventory .............................................................................................................................................................. 4-8
4.2 Network View ........................................................................................................................................................................ 4-12
Chapter 5 Device Configuration
5.1 Basic Configuration .................................................................................................................................................................. 5-3
5.2 Basic Device Configuration ...................................................................................................................................................... 5-5
5.3 License Configuration .............................................................................................................................................................. 5-8
5.4 Assigning Certificates ............................................................................................................................................................ 5-11
5.4.1 Certificate Management ............................................................................................................................................. 5-13
5.4.2 RSA Key Management ................................................................................................................................................ 5-21
5.4.3 Certificate Creation ..................................................................................................................................................... 5-26
5.4.4 Generating a Certificate Signing Request .................................................................................................................. 5-28
5.5 RF Domain Overrides ............................................................................................................................................................. 5-31
5.6 Profile Overrides .................................................................................................................................................................... 5-37
5.6.1 Controller Cluster Configuration Overrides (Controllers Only) .................................................................................... 5-39
5.6.2 Access Point Adoption Overrides (Access Points Only) .............................................................................................. 5-41
5.6.3 Access Point Radio Power Overrides (Access Points Only) ........................................................................................ 5-43
5.6.4 Profile Interface Override Configuration ..................................................................................................................... 5-45
5.6.4.1 Ethernet Port Override Configuration ................................................................................................................ 5-46
5.6.4.2 Virtual Interface Override Configuration ........................................................................................................... 5-54
5.6.4.3 Port Channel Override Configuration ................................................................................................................ 5-59
5.6.4.4 Radio Override Configuration ............................................................................................................................ 5-66
5.6.4.5 WAN Backhaul Override Configuration ............................................................................................................ 5-76
5.6.4.6 PPPoE Override Configuration ........................................................................................................................... 5-79
5.6.5 Overriding a Profile’s Network Configuration ............................................................................................................. 5-82
5.6.5.1 Overriding a Profile’s DNS Configuration ......................................................................................................... 5-82
5.6.5.2 Overriding a Profile’s ARP Configuration .......................................................................................................... 5-84
5.6.5.3 Overriding a Profile’s L2TPV3 Configuration ..................................................................................................... 5-86
5.6.5.4 Overriding a Profile’s Quality of Service (QoS) Configuration .......................................................................... 5-94
5.6.5.5 Overriding a Profile’ Spanning Tree Configuration ........................................................................................... 5-96
5.6.5.6 Overriding a Profile’s Routing Configuration ................................................................................................... 5-99
5.6.5.7 Dynamic Routing (OSPF) .................................................................................................................................. 5-101
5.6.5.8 Overriding a Profile’s Forwarding Database Configuration ............................................................................ 5-111
5.6.5.9 Overriding a Profile’s Bridge VLAN Configuration .......................................................................................... 5-113
5.6.5.10 Overriding a Profile’s Cisco Discovery Protocol Configuration ..................................................................... 5-118
5.6.5.11 Overriding a Profile’s Link Layer Discovery Protocol Configuration .............................................................. 5-120
5.6.5.12 Overriding a Profile’s Miscellaneous Network Configuration ...................................................................... 5-122
5.6.6 Overriding a Profile’s Security Configuration ............................................................................................................ 5-123
5.6.6.1 Overriding a Profile’s General Security Settings ............................................................................................ 5-125
5.6.6.2 Overriding a Profile’s Certificate Revocation List (CRL) Configuration ........................................................... 5-127
5.6.6.3 Overriding a Profile’s ISAKMP Configuration ................................................................................................. 5-128
5.6.6.4 Overriding a Profile’s Transform Set Configuration ........................................................................................ 5-132
5.6.6.5 Overriding a Profile’s VPN Configuration ....................................................................................................... 5-135
5.6.6.6 Overriding a Profile’s NAT Configuration ........................................................................................................ 5-151
5.6.6.7 Overriding a Profile’s Bridge NAT Configuration ............................................................................................. 5-159
11. Table of Contents 11
14.4.24 Captive Portal Statistics ...................................................................................................................................... 14-174
14.4.25 Network Time ...................................................................................................................................................... 14-175
14.4.25.1 Viewing NTP Status .................................................................................................................................. 14-176
14.4.25.2 Viewing NTP Associations ........................................................................................................................ 14-177
14.5 Wireless Client Statistics ................................................................................................................................................ 14-180
14.5.1 Health .................................................................................................................................................................... 14-180
14.5.2 Details ................................................................................................................................................................... 14-183
14.5.3 Traffic .................................................................................................................................................................... 14-185
14.5.4 WMM TSPEC ........................................................................................................................................................ 14-188
Appendix A Customer Support
A.1 Motorola’s Enterprise Mobility Support Center ......................................................................................................................A-1
A.2 Customer Support Web Site ...................................................................................................................................................A-1
A.3 Manuals ..................................................................................................................................................................................A-1
Appendix B Publicly Available Software
B.1 General Information ................................................................................................................................................................ B-1
B.2 Open Source Software Used ................................................................................................................................................... B-1
B.2.1 Wireless Controller ....................................................................................................................................................... B-2
B.2.2 AP650 / AP6532 ............................................................................................................................................................ B-4
B.2.3 AP51xx .......................................................................................................................................................................... B-6
B.2.4 AP7131 .......................................................................................................................................................................... B-6
B.3 OSS Licenses .......................................................................................................................................................................... B-9
B.3.1 GNU General Public License 2.0 ................................................................................................................................... B-9
B.3.2 GNU Lesser General Public License 2.1 ..................................................................................................................... B-13
B.3.3 BSD Style Licenses ..................................................................................................................................................... B-19
B.3.4 MIT License ................................................................................................................................................................. B-19
B.3.5 WU-FTPD License ....................................................................................................................................................... B-20
B.3.6 Open SSL License ....................................................................................................................................................... B-21
B.3.7 ZLIB License ................................................................................................................................................................ B-22
B.3.8 Open LDAP Public License .......................................................................................................................................... B-23
B.3.9 Apache License 2.0 ..................................................................................................................................................... B-23
B.3.10 Drop Bear License ..................................................................................................................................................... B-26
B.3.11 Sun Community Source License ............................................................................................................................... B-27
B.3.12 The Zope Public License Ver.2.0 (ZPL-2.0) ................................................................................................................ B-37
B.3.13 ZLIB / LIB PNG License ............................................................................................................................................. B-38
Appendix C Upgrading From WiNG 4 to WiNG 5
C.1 AP650 ...................................................................................................................................................................................... C-1
C.1.1 Upgrade WiNG 4.x to 5.x .............................................................................................................................................. C-1
C.1.2 Downgrade WiNG 5.x to 4.x ......................................................................................................................................... C-1
C.1.3 AP650 Connectivity in WiNG 5.x .................................................................................................................................. C-1
C.2 AP7131 / AP71xx ..................................................................................................................................................................... C-2
C.2.1 Upgrade WiNG 4.x to 5.x .............................................................................................................................................. C-2
C.2.2 Downgrade 5.x (WiNG) to 4.x (APn) ............................................................................................................................. C-2
C.2.3 Migration Files .............................................................................................................................................................. C-2
C.2.4 Recovery of a Pre-4.1.1-18R Access Point .................................................................................................................... C-2
C.2.5 AP7131 / 7131N Connectivity in WiNG 5.x .................................................................................................................. C-3
12. 12 WiNG 5 System Reference Guide
C.2.6 Configuration Restoration .............................................................................................................................................C-3
C.2.7 WiNG 5.2 Minimum Requirements ...............................................................................................................................C-3
C.3 Controllers ...............................................................................................................................................................................C-4
C.3.1 Upgrade WiNG 4.x to 5.x ..............................................................................................................................................C-4
C.3.2 Migrating WiNG 4.x Configuration File to 5.2 Configuration File ................................................................................C-4
C.3.3 Downgrade WiNG 5.x to 4.x .........................................................................................................................................C-4
C.3.4 WiNG 5.2 Minimum Requirements ...............................................................................................................................C-4
C.4 AP Discovery Tool ....................................................................................................................................................................C-5
C.4.1 AP Discovery Tool Installation .......................................................................................................................................C-5
C.4.2 Using the AP Discovery Tool .......................................................................................................................................C-10
13. ABOUT THIS GUIDE
This guide provides information about using WiNG 5.3 on the Motorola Solutions Wireless Services Controller Family. The
Wireless Solutions Controller Family is comprised of RFS4000, RFS6000, RFS7000 and NX9000 Series models.
NOTE: Screens and windows pictured in this guide are samples and can differ from
actual screens.
Documentation Set
The documentation set for the Motorola Solutions Wireless Services Controllers is partitioned into the following guides
to provide information for specific user needs.
• Installation Guides - Each controller has a unique Installation Guide which describes the basic hardware setup and
configuration required to transition to more advanced configuration of the wireless controllers.
• Motorola Solutions WING 5 Access Point System Reference Guide - Describes the configuration of either a Standalone
AP or Virtual Controller AP using the access point’s initial setup wizard and resident WING 5 access point specific
software, go to http://supportcentral.motorola.com/support/product/manuals.do
• Motorola Solutions WING 5 Enterprise System Reference Guide (this guide) - Describes the configuration of a
Dependent mode AP using the WING 5 controller software. For information on managing a dependent mode AP in a
controller managed network.
• Motorola Solutions Wireless Services CLI Reference - Describes the Command Line Interface (CLI) and Management
Information Base (MIB) commands used to configure the Motorola Solutions Wireless Services Controllers.
14. 2-2 WiNG 5 System Reference Guide
Document Conventions
The following conventions are used in this document to draw your attention to important information:
NOTE: Indicate tips or special requirements.
Controller Note: Indicates caveats unique to a RFS4000, RFS6000, RFS7000 or NX9000
series wireless service controller.
CAUTION: Indicates conditions that can cause equipment damage or data loss.
!
WARNING! Indicates a condition or procedure that could result in personal injury or
equipment damage.
Notational Conventions
The following additional notational conventions are used in this document:
• GUI text is used to highlight the following:
• Screen names
• Menu items
• Button names on a screen.
• Bullets (•) indicate:
• Action items
• Lists of alternatives
• Lists of required steps that are not necessarily sequential
• Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
15. CHAPTER 1 OVERVIEW
Motorola Solutions’ family of wireless controllers with the 802.11n Access Points enable the centralized distribution of
high performance, secure and resilient wireless voice and data services to remote locations with the scalability required
to meet the needs of large distributed enterprises.
A Motorola Solutions RFS family controller provides a single platform capable of delivering wireless voice and data inside
and outside the enterprise for small, medium and large enterprise deployments. Improve operational efficiency and reduce
the cost of mobility with a powerful comprehensive feature set including adaptive AP, which delivers unmatched
performance, security, reliability and scalability to enable networks for business mobility at a low TCO.
Wireless controllers provide local centralized management and control of 802.11n Access Points and the WING 5 APs
provide the necessary core switching and routing to eliminate additional routing and switching infrastructure.
802.11n is the next generation WLAN standard that provides improved performance and coverage compared with previous
802.11 specifications. 802.11n provides enhancements to support throughput up to 450 Mbps. With these enhancements
Motorola Solutions' next generation 802.11n Access Points offer client data-rates of up to 300Mbps.
A WiNG 5 managed network uses 802.11n Access Points and peer controllers to adapt to the dynamic circumstances of
their deployment environment. The WiNG 5 architecture provides a customized site-specific deployment, supporting the
best path and routes based on the user, location, the application and the best route available (both wireless and wired).
A WiNG managed network assures end-to-end quality, reliability and security without latency and performance
degradation. A WiNG 5 managed network supports rapid application delivery, mixed-media application optimization and
quality assurance.
Deploying a new Motorola Solutions WiNG 5 network does not require the replacement of an existing Motorola Solutions
wireless infrastructure. WiNG 5 enables the simultaneous use of existing architectures from Motorola Solutions and other
vendors, even if those other architectures are centralized models. A wireless network administrator can retain and
optimize legacy infrastructure while evolving to WiNG 5 as required. Adaptive Access Points can operate in a dependent
environment and are field-upgradable to WiNG 5. Controllers can be upgraded to the WiNG 5 operating system with ease.
The Motorola Solutions WiNG 5 architecture is designed for 802.11n networking. It leverages the best aspects of
independent and dependent architectures to create a smart network that meets the connectivity, quality and security
needs of each user deployment and their application requirements, based on the availability of network resources,
including wired networks.
By distributing intelligence and control between the wireless controllers and Access Points, a WiNG 5 managed network
can route data directly using the best path, as determined by factors including the user, the location, the application and
available wireless and wired resources. As a result, the additional load placed on the wired network from 802.11n is
significantly reduced, as traffic does not require an unnecessary backhaul to a central controller.
16. 1-2 WiNG 5 System Reference Guide
Within a WiNG 5 managed network, up to 80% of the network traffic can remain on the wireless mesh, and never
touch the wired network, so the 802.11n load impact on the wired network is negligible. In addition, latency and
associated costs are reduced while reliability and scalability are increased. A WiNG 5 managed network enables the
creation of dynamic wireless traffic flows, so any bottleneck is avoided, and the destination is reached without
latency or performance degradation. This behavior delivers a significantly better quality of experience for the end
user.
The same distributed intelligence enables more resilience and survivability, since the Access Points keep users
connected and traffic flowing with full QoS, security and mobility even if the connection to the wireless controller is
interrupted due to a wired network or backhaul problem.
Even when the network is fully operational, outside RF interference sources or unbalanced wireless network loading
can be automatically corrected by the WiNG 5 Smart RF system. Smart RF senses interference or potential client
connectivity problems and makes the required changes to channel and Access Point radio power while minimizing the
impact to latency sensitive applications like VoIP. Using Smart RF, the managed network can continuously adjust
Access Point power and channel assignments for self-recovery if an AP fails or a coverage hole is detected.
Additionally, integrated Access Point sensors in conjunction with AirDefense Network Assurance alerts
administrators of interference and network coverage problems, which shortens response times and boosts overall
reliability and availability of the WiNG 5 managed network.
Network traffic optimization protects WiNG 5 managed networks from broadcast storms and minimizes congestion
on the wired network. WiNG 5 networks provide VLAN load balancing, WAN traffic shaping and optimizations in
dynamic host configuration protocol (DHCP) responses and Internet group management protocol (IGMP) snooping for
multicast traffic flows in wired and wireless networks. Thus, users benefit from an extremely reliable network that
adapts to meet their needs and delivers mixed-media applications.
Firmware and configuration updates are supported within the managed network, from one Access Point to another,
over the air or wire, and can be centrally managed by the controller. Controllers no longer need to push firmware and
configurations to each individual Access Point, reducing unnecessary network congestion.
WiNG 5 uses remote Authentication Dial-in User Service (RADIUS) synchronization capabilities between the core and
the access layer. If the central authentication mechanism is not available, users can authenticate using the controller
local RADIUS resources, and continue network support with secure access.
17. CHAPTER 2 WEB UI FEATURES
WiNG software contains a Web UI allowing network administrators to manage and view Motorola Solutions Wireless
controller settings, configuration and status. This Graphical User Interface (GUI) allows full control of all managed
features.
Wireless controllers also include a Command Line Interface (CLI) for managing and viewing settings, configuration and
status. For more information on the command line interface and a full list of available commands, see the Motorola
Solutions Wireless Services Controller CLI Reference Guide available at
http://supportcentral.motorola.com/support/product/manuals.do.
For information on how to access and use the controller Web UI, see:
• Accessing the Web UI
• Glossary of Icons Used
18. 2-2 WiNG 5 System Reference Guide
2.1 Accessing the Web UI
Motorola Solutions wireless controllers use a UI accessed using any supported Web browser on a client connected
to the subnet the Web UI is configured on.
2.1.1 Browser and System Requirements
To access the UI, a browser supporting Flash Player 10 is recommended. The system accessing the GUI should have
a minimum of 512Mb or RAM for the UI to display and function properly. The WiNG UI is based on Flex, and does not
use Java as its underlying framework.
The following browsers have been validated with the WiNG Web UI:
• Firefox 3.6
• Internet Explorer 7.x
• Internet Explorer 8.x
NOTE: Throughout the Web UI leading and trailing spaces are not allowed in any text
fields. In addition, the “?” character is also not supported in text fields.
2.1.2 Connecting to the Web UI
1. Connect one end of an Ethernet cable to any of the five LAN ports on the front of the RFS4011 and connect the
other end to a computer with a working Web browser.
2. Set the computer to use an IP address between 192.168.0.10 and 192.168.0.250 on the connected port. Set a
subnet / network mask of 255.255.255.0.
3. Once the computer has an IP address, point the Web broswer to: https://192.168.0.1/ and the following login
screen will display.
Figure 2-1 Web UI Login Screen
4. Enter the default username admin in the Username field.
5. Enter the default password motorola in the Password field.
6. Click the Login button to load the management interface.
7. If this is the first time the UI has been accessed, a dialogue displays to begin an initial setup wizard. For more
information on using the initial setup wizard see Using the Initial Setup Wizard on page 3-2.
19. Web UI Features 2-3
2.2 Glossary of Icons Used
The UI uses a number of icons used to interact with the system, gather information, and obtain status for the entities
managed by the system. This chapter is a compendium of the icons used. This chapter is organized as follows:
• Global Icons
• Dialog Box Icons
• Table Icons
• Status Icons
• Configurable Objects
• Configuration Objects
• Configuration Operation Icons
• Access Type Icons
• Administrative Role Icons
• Device Icons
2.2.1 Global Icons
Glossary of Icons Used
This section lists global icons available throughout the controller interface.
Logoff – Select this icon to log out of the managed system. This icon is always
available and is located at the top right corner of the UI.
Add – Select this icon to add a row in a table. When selected, a new row is created
in the table or a dialog box displays where you can enter values for a particular list.
Delete – Select this icon to remove a row from a table. When selected, the
selected row is deleted.
More Information – Select this icon to display a pop up with supplementary
information that may be available for an item.
Trash – Select this icon to remove a row from a table. When selected, the row is
immediately deleted.
20. 2-4 WiNG 5 System Reference Guide
Create new policy – Select this icon to create a new policy. Policies define
different configuration parameters that can be applied to individual device
configurations, device profiles and RF Domains.
Edit policy – Select this icon to edit an existing policy. To edit a policy, select a
policy and this icon.
2.2.2 Dialog Box Icons
Glossary of Icons Used
These icons indicate the current state of various controls in a dialog. These icons enables you to gather, at a glance,
the status of all the controls in a dialog. The absence of any of these icons next to a control indicates the value in that
control has not been modified from its last saved configuration.
Entry Updated – Indicates a value has been modified from its last saved
configuration.
Entry Update – States that an override has been applied to a device’s profile
configuration.
Mandatory Field – Indicates this control value is a mandatory configuration
item. You will not be allowed to proceed further without providing all
mandatory values in this dialog.
Error in Entry – Indicates there is an error in a value entered in this control. A
small red popup provides a likely cause of the error.
2.2.3 Table Icons
Glossary of Icons Used
The following two override icons are status indicators for transactions:
Table Row Overridden – Indicates a change (profile configuration override)
has been made to a table row and the change will not be implemented until
saved. This icon represents a change from this device’s profile assigned
configuration.
Table Row Added – Indicates a new row has been added to a table and the
change is not implemented until saved. This icon represents a change from
this device’s profile assigned configuration.
21. Web UI Features 2-5
2.2.4 Status Icons
Glossary of Icons Used
These icons indicate device status, operations on the wireless controller, or any other action that requires a status
returned to the user.
Fatal Error – States there is an error causing a managed device to stop
functioning.
Error – Indicates an error exits requiring intervention. A managed action has
failed, but the error is not system wide.
Warning – States a particular action has completed, but errors were detected
that did not prevent the process from completing. Intervention might still be
required to resolve subsequent warnings.
Success – Indicates everything is well within the managed network or a
process has completed successfully without error.
Information – This icon always precedes information displayed to the user.
This may either be a message displaying progress for a particular process, or
just be a message from the system.
2.2.5 Configurable Objects
Glossary of Icons Used
These icons represent configurable items within the controller’s UI.
Device Configuration – Represents a configuration file supporting a device
category (AP, Wireless Controller etc.).
Provisioning Policy – Represents a provisioning policy. Adoption policies are
a set of configuration parameters that define how APs and wireless clients
are adopted by a controller.
Critical Resource Policy – States a critical resource policy has been applied.
Critical resources are resources whose availability is essential to the
managed network. If any of these resources is unavailable, an administrator
is notified.
Wireless LANs – States an action impacting a managed WLAN has occurred.
22. 2-6 WiNG 5 System Reference Guide
WLAN QoS Policy – States a quality of service policy (QoS) configuration has
been impacted.
Radio QoS Policy – Indicates a radio’s QoS configuration has been impacted.
AAA Policy – Indicates an Authentication, Authorization and Accounting
(AAA) policy has been impacted. AAA policies define RADIUS authentication
and accounting parameters.
Association ACL – Indicates an Access Control List (ACL) configuration has
been impacted. An ACL is a set of configuration parameters either allowing
or denying access to managed resources.
Smart RF Policy – States a Smart RF policy has been impacted. Smart RF
enables neighboring APs to take over for an AP if it becomes unavailable. This
is accomplished by increasing the power of radios on nearby APs to cover the
hole created by the non-functioning AP.
Profile – States a device profile configuration has been impacted. A profile is
a collection of configuration parameters used to configure a device or a
feature.
Bridging Policy – Indicates a bridging policy configuration has been impacted.
A Bridging Policy defines which VLANs are bridged, and how local VLANs are
bridged between the wired and wireless sides of the managed network.
RF Domain – States an RF Domain configuration has been impacted.
Firewall Policy – Indicates a firewall policy has been impacted. Firewalls
provide a barrier that prevents unauthorized access to resources while
allowing authorized access to external and internal controller resources.
IP Firewall Rules – Indicates an IP firewall rule has been applied. An IP based
firewall rule implements restrictions based on the IP address in a received
packet.
MAC Firewall Rules – States a MAC based firewall rule has been applied. A
MAC based firewall rule implements firewall restrictions based on the MAC
address in a received packet.
Wireless Client Role – Indicates a wireless client role has been applied to a
managed client. The role could be either sensor or client.
23. Web UI Features 2-7
WIPS Policy – States the conditions of a WIPS policy have been invoked.
WIPS prevents unauthorized access to the managed network by checking for
(and removing) rogue APs and wireless clients.
Advanced WIPS Policy – States the conditions of an advanced WIPS policy
have been invoked.
Device Categorization – Indicates a device categorization policy has been
applied. This is used by the intrusion prevention system to categorize APs or
wireless clients as either sanctioned or unsanctioned devices. This enables
devices to bypass the intrusion prevention system.
Captive Portal – States a captive portal is being applied. Captive portal is
used to provide hotspot services to wireless clients.
DNS Whitelist – A DNS whitelist is used in conjunction with captive portal to
provide hotspot services to wireless clients.
DHCP Server Policy – Indicates a DHCP server policy is being applied. DHCP
provides IP addresses to wireless clients. A DHCP server policy configures
how DHCP provides IP addresses.
RADIUS Group – Indicates the configuration of RADIUS group has been
defined and applied. A RADIUS group is a collection of RADIUS users with the
same set of permissions.
RADIUS User Pools – States a RADIUS user pool has been applied. RADIUS
user pools are a set of IP addresses that can be assigned to an authenticated
RADIUS user.
RADIUS Server Policy – Indicates a RADIUS server policy has been applied. A
RADIUS server policy is a set of configuration attributes used when a RADIUS
server is configured for AAA.
Management Policy – Indicates a management policy has been applied.
Management policies configure access control, authentication, traps and
administrator permissions.
24. 2-8 WiNG 5 System Reference Guide
2.2.6 Configuration Objects
Glossary of Icons Used
These configuration icons are used to define the following:
Configuration – Indicates an item capable of being configured by a controller
interface.
View Events / Event History – Defines a list of events. Click this icon to view
events or view the event history.
Core Snapshots – Indicates a core snapshot has been generated. A core
snapshot is a file that records status when a process fails on the wireless
controller.
Panic Snapshots – Indicates a panic snapshot has been generated. A panic
snapshot is a file that records statu when the wireless controller fails without
recovery.
UI Debugging – Select this icon/link to view current NETCONF messages.
View UI Logs – Select this icon/link to view the different logs generated by
the UI, FLEX and the error logs.
2.2.7 Configuration Operation Icons
Glossary of Icons Used
The following operations icons are used to define configuration operations:
Revert – When selected, any changes made after the last saved configuration
are restored back to the last saved configuration.
Commit – When selected, all changes made to the configuration are written
to the system. Once committed, changes cannot be reverted.
Save – When selected, changes are saved to the configuration.