306
C
HAPTER
13: C
ONFIGURING
U
SER
E
NCRYPTION
auto-tune max-power: default
Port 6: AP model: mp-252, POE: enable, bias: high, name: MAP11
boot-download-enable: YES
force-image-download: YES
Radio 1: type: 802.11g, mode: enabled, channel: 6
tx pwr: 1, profile: rp2
auto-tune max-power: default
Port 11: AP model: mp-252, POE: enable, bias: high, name: MP11
boot-download-enable: YES
force-image-download: YES
Radio 1: type: 802.11g, mode: enabled, channel: 6
tx pwr: 1, profile: rp2
auto-tune max-power: default
Radio 2: type: 802.11a, mode: enabled, channel: 36
tx pwr: 1, profile: rp2
auto-tune max-power: default
9
Save the configuration. Type the following command:
WX1200#
save config
success: configuration saved.
Configuring
Encryption for MAC
Clients
The following example shows how to configure MSS to provide PSK
authentication and TKIP or 40-bit WEP encryption for MAC clients:
1
Create an authentication rule that sends all MAC users of SSID
voice
to
the local database for authentication and authorization. Type the
following command:
WX1200#
set authentication mac ssid voice * local
success: configuration saved.
2
Configure a MAC user group named
wpa-for-mac
that assigns all MAC
users in the group to VLAN
blue
. Type the following command:
WX1200#
set mac-usergroup wpa-for-mac attr vlan-name blue
success: configuration saved.
3
Add MAC users to MAC user group
wpa-for-mac
. Type the following commands:
WX1200#
set mac-user aa:bb:cc:dd:ee:ff group wpa-for-mac
success: configuration saved.
WX1200#
set mac-user a1:b1:c1:d1:e1:f1 group wpa-for-mac
success: configuration saved.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...