set service-profile auth-dot1x
373
See Also
display service-profile
on page 321
display sessions network
on page 525
set service-profile
auth-dot1x
Disables or reenables 802.1X authentication of Wi-Fi Protected Access
(WPA) clients by MAP radios, when the WPA information element (IE) is
enabled in the service profile that is mapped to the radio profile that the
radios are using.
Syntax
—
set service-profile
name
auth-dot1x
{
enable
|
disable
}
name
— Service profile name.
enable
—
Enables 802.1X authentication of WPA clients.
disable
—
Disables 802.1X authentication of WPA clients.
Defaults
— When the WPA IE is enabled, 802.1X authentication of WPA
clients is enabled by default. If the WPA IE is disabled, the
auth-dot1x
setting has no effect.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— This command does not disable dynamic WEP for non-WPA
clients. To disable dynamic WEP for non-WPA clients, enable the WPA IE
(if not already enabled) and disable the 40-bit WEP and 104-bit WEP
cipher suites in the WPA IE, if they are not already disabled.
To use 802.1X authentication for WPA clients, you also must enable the
WPA IE.
If you disable 802.1X authentication of WPA clients, the only method available
for authenticating the clients is preshared key (PSK) authentication. To use this,
you must enable PSK support and configure a passphrase or key.
Examples
— The following command disables 802.1X authentication for
WPA clients that use service profile
wpa_clients
:
WX4400#
set service-profile wpa_clients auth-dot1x disable
success: change accepted.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...