security suite create
337
Default Configuration
Empty list.
Command Mode
ESS Configuration mode
User Guidelines
Use the mac-filtering action ESS configuration command to enable the
MAC-address-filtering list and to define the MAC-address-filtering list
type.
Example
The following example adds the MAC address 00-9E-92-4C-73-FC to the
MAC address filtering list in an ESS.
security suite create
The
security suite create
ESS Configuration command creates a security
suite for an ESS. To delete a security suite, use the
no
form of this
command.
Syntax
security suite create
type
[{
key-hex
|
key-ascii
}
encryption-key
]
no security suite create
type
Parameters
■
type
— The security suite type. Available values are as follows:
■
open-wep
— No authentication with WEP for data encryption. Wired
Equivalent Privacy (WEP) is a scheme to secure wireless networks
(WiFi). Because a wireless network broadcasts messages using radio, it
is particularly susceptible to eavesdropping. WEP provides comparable
confidentiality to a traditional wired network. WEP provides a bare
minimal level of security that can deter casual snooping.
■
shared-wep
— Shared authentication only with WEP encryption.
■
open-shared-wep
— Open or shared authentication with WEP
encryption.
Console (Config)#
wlan ess configure ssid
enterprise
Console (Config-wlan-ess)#
mac-filtering list add
00-9E-92-4C-73-FC
Summary of Contents for 3CRUS2475 24
Page 18: ......
Page 40: ...40 CHAPTER 2 AAA COMMANDS ...
Page 54: ...54 CHAPTER 3 ACL COMMANDS ...
Page 76: ...76 CHAPTER 4 ADDRESS TABLE COMMANDS ...
Page 166: ...166 CHAPTER 10 CLOCK COMMANDS ...
Page 200: ...200 CHAPTER 13 LACP COMMANDS ...
Page 208: ...208 CHAPTER 14 POWER OVER ETHERNET COMMANDS ...
Page 262: ...262 CHAPTER 15 SPANNING TREE COMMANDS ...
Page 278: ...278 CHAPTER 17 RADIUS COMMAND ...
Page 281: ...show ports monitor 281 g1 8 RX TX Active g2 8 RX TX Active g18 8 RX Active ...
Page 282: ...282 CHAPTER 18 PORT MONITOR COMMANDS ...
Page 306: ...306 CHAPTER 19 SNMP COMMANDS ...
Page 316: ...316 CHAPTER 20 IP ADDRESS COMMANDS ...
Page 330: ...330 CHAPTER 22 WIRELESS ROGUE AP COMMANDS ...
Page 350: ...350 CHAPTER 23 WIRELESS ESS COMMANDS ...
Page 382: ...382 CHAPTER 25 SSH COMMANDS ...
Page 400: ...400 CHAPTER 27 TACACS COMMANDS Global values TimeOut 3 ...
Page 444: ...444 CHAPTER 31 USER INTERFACE COMMANDS ...
Page 454: ...454 CHAPTER 32 GVRP COMMANDS ...
Page 492: ...492 CHAPTER 34 802 1X COMMANDS ...
Page 521: ...Troubleshooting Solutions 521 ...
Page 522: ...522 CHAPTER 37 TROUBLESHOOTING ...