Restarting the Network ................................................................................................ C-12
Action List ...................................................................................................................... D-1
Field List ........................................................................................................................ D-1
Outbound Log ................................................................................................................ D-1
Inbound Log ................................................................................................................... D-2
Other IP Traffic .............................................................................................................. D-2
Router Operation ........................................................................................................... D-3
DoS Attack/Scan ........................................................................................................... D-4
Access Block Site .......................................................................................................... D-6
System Admin Sessions ................................................................................................ D-6
Appendix E
Infrastructure Mode ................................................................................................. E-1
802.11 Authentication .............................................................................................. E-3
Key Size .................................................................................................................. E-6
Wireless Channels ......................................................................................................... E-7
WPA Wireless Security .................................................................................................. E-8
Contents
201-10301-02, May 2005
xi