276
C
HAPTER
12: C
ONFIGURING
WLAN M
ESH
S
ERVICES
Configuring the
Service Profile for
Mesh Services
You configure the Mesh Portal AP to beacon the mesh services SSID. To
do this, create a service profile and enable mesh services using the
following commands:
set service-profile
mesh-service-profile
ssid-name
mesh-ssid
set service-profile
mesh-service-profile
mesh mode
{
enable
|
disable
}
The service profile can then be mapped to a radio profile that manages a
radio on the Mesh Portal MAP. Note that the radio profile to which the
service profile is mapped cannot be configured to auto-tune power or
channel settings.
Configuring Security
The secure connection between the Mesh AP and the Mesh Portal AP is
established in a two-step process: creation of an encrypted
point-to-point link between the Mesh AP, and the Mesh Portal AP,
then authentication of the Mesh
AP.
When the Mesh AP is booted, it searches for a beacon containing the
configured mesh SSID. Once it locates a Mesh Portal AP with the mesh
SSID, it associates with the Mesh Portal AP as a client device. The Mesh
AP can then be authenticated by the WX switch.
To configure the Mesh AP to be authenticated, use the following
commands:
set service-profile
mesh-service-profile
rsn-ie enable
set service-profile
mesh-service-profile
auth-psk enable
set service-profile
mesh-service-profile
cipher-ccmp enable
set service-profile
mesh-service-profile
cipher-tkip disable
set service-profile
mesh-service-profile
{
psk-phrase
pass-phrase
|
psk-raw
raw-pass
}
set mac-user
mesh-ap-mac-addr
attr vlan-name default
set authentication mac ssid
mesh-ssid
* local
The
pass-phrase
or
raw-pass
is the same one configured on the Mesh AP.
In
addition, the Mesh AP must have its serial number and fingerprint
configured o
n the WX switch.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...