338
C
HAPTER
23: W
IRELESS
ESS C
OMMANDS
■
802.1x
— 802.1x authentication with WEP.
■
wpa
— Wi-Fi Protected Access (WPA and WPA2) are systems to
secure wireless (Wi-Fi) networks. WPA implements the majority of the
IEEE 802.11i standard, and was intended as an intermediate measure to
take the place of WEP while 802.11i was prepared. WPA is designed to
work with all wireless network interface cards, but not necessarily with
first generation wireless access points. WPA2 implements the full
standard, but will not work with some older network cards.
■
wpa-psk
— WPA with pre-shared key.
■
wpa2
— Indicates that Wi-Fi Protected Access 2 (WPA) is the selected
WLAN security method. WPA2 with 802.1x authenticates WLAN
users and dynamically generate keys.
■
wpa2-psk
— WPA2 with pre-shared key.
■
key
— A key must be entered for
open-wep
,
shared-wep
,
openshared-wep
,
wpa-psk
and
wpa2-psk
. A key should not be
entered for
802.1x
,
wpa
and
wpa2
. See the
key
command in
Security-Suite ESS Configuration mode for information on the range
of the key size.
■
key-hex
— Specifies the entry of a pre-shared key (psk) in hexadecimal
format. (Range: 10-26 characters)
■
key-ascii
— Specifies the entry of a pre-shared key (psk) in ASCII
format. (Key length: 5 or 13 characters)
■
encryption-key
— Specifies the pre-shared key. See usage guidelines
for the key size range.
■
ssid
— The ESS SSID string. (Range: 1-32 characters)
Default Configuration
WPA security suite exists.
Command Mode
ESS Configuration mode
User Guidelines
■
If no security-suite exists, the product works in 802.11 open security
mode.
■
WPA security suite and WPA-PSK security suite cannot exist
simultaneously.
Summary of Contents for 3CRUS2475 24
Page 18: ......
Page 40: ...40 CHAPTER 2 AAA COMMANDS ...
Page 54: ...54 CHAPTER 3 ACL COMMANDS ...
Page 76: ...76 CHAPTER 4 ADDRESS TABLE COMMANDS ...
Page 166: ...166 CHAPTER 10 CLOCK COMMANDS ...
Page 200: ...200 CHAPTER 13 LACP COMMANDS ...
Page 208: ...208 CHAPTER 14 POWER OVER ETHERNET COMMANDS ...
Page 262: ...262 CHAPTER 15 SPANNING TREE COMMANDS ...
Page 278: ...278 CHAPTER 17 RADIUS COMMAND ...
Page 281: ...show ports monitor 281 g1 8 RX TX Active g2 8 RX TX Active g18 8 RX Active ...
Page 282: ...282 CHAPTER 18 PORT MONITOR COMMANDS ...
Page 306: ...306 CHAPTER 19 SNMP COMMANDS ...
Page 316: ...316 CHAPTER 20 IP ADDRESS COMMANDS ...
Page 330: ...330 CHAPTER 22 WIRELESS ROGUE AP COMMANDS ...
Page 350: ...350 CHAPTER 23 WIRELESS ESS COMMANDS ...
Page 382: ...382 CHAPTER 25 SSH COMMANDS ...
Page 400: ...400 CHAPTER 27 TACACS COMMANDS Global values TimeOut 3 ...
Page 444: ...444 CHAPTER 31 USER INTERFACE COMMANDS ...
Page 454: ...454 CHAPTER 32 GVRP COMMANDS ...
Page 492: ...492 CHAPTER 34 802 1X COMMANDS ...
Page 521: ...Troubleshooting Solutions 521 ...
Page 522: ...522 CHAPTER 37 TROUBLESHOOTING ...