230
C
HAPTER
10: C
ONFIGURING
MAP A
CCESS
P
OINTS
The maximum transmission unit (MTU) for encrypted MAP management
traffic is 1498 bytes, whereas the MTU for unencrypted management
traffic is 1474 bytes. Make sure the devices in the intermediate network
between the WX switch and Distributed MAP can support the higher MTU.
Encryption Key Fingerprint
MAPs are configured with an encryption key pair at the factory. The
fingerprint for the public key is displayed on a label on the back of the
MAP, in the following format:
RSA
aaaa:aaaa:aaaa:aaaa:
aaaa:aaaa:aaaa:aaaa
If the MAP is already installed, you can display the fingerprint in MSS.
(See “Finding the Fingerprint” on page 231.)
Encryption Options
By default, a WX can configure and manage a Distributed MAP regardless
of whether the MAP has an encryption key, and regardless of whether
you have confirmed the fingerprint by setting it in MSS.
You can configure a WX to require Distributed MAPs to have an
encryption key. In this case, the WX also requires their fingerprints to be
confirmed in MSS. When MAP security is required, a MAP can establish a
management session with the WX only if its fingerprint has been
confirmed in MSS.
If you do not want any MAPs to use encryption for management
information, you can disable the feature.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...