Administering the WMIC
Managing Aironet Extensions
40
Cisco 3200 Series Wireless MIC Software Configuration Guide
For more information about SSH, see the “Configuring Secure Shell” section in the
Cisco IOS Security
Configuration Guide for Release 12.2
.
Note
The SSH feature in Cisco IOS release 12.3(8)JK does not support IP Security (IPSec).
Configuring SSH
Before you configure SSH, download the crypto software image from Cisco.com. For information about
configuring SSH and displaying SSH settings, see the “Configuring Secure Shell” section in the
Cisco
IOS Security Configuration Guide for Release 12.2
.
Managing Aironet Extensions
The WMIC uses Cisco Aironet 802.11 extensions to detect the capabilities of Cisco client devices and
to support features that require specific interaction between the WMIC and associated client devices.
The Aironet extensions can be deactivated only in the root access point mode. Since workgroup bridge,
root device, and non-root bridge are Cisco-specific modes, they always use the Aironet extensions.
Aironet extensions must be enabled to support the following features:
•
Load balancing—The WMIC uses Aironet extensions to direct client devices to an access point that
provides the best connection to the network, based on such factors as number of users, bit error rates,
and signal strength.
•
Message Integrity Check (MIC)—MIC is an additional WEP security feature that prevents attacks
on encrypted packets called
bit-flip attacks
. The MIC, implemented on both the WMIC and all
associated client devices, adds a few bytes to each packet to make the packets tamper-proof.
•
Temporal Key Integrity Protocol (TKIP)—TKIP, also known as
WEP key hashing
, is an additional
WEP security feature that defends against an attack on WEP in which the intruder uses an
unencrypted segment called the
initialization vector
(IV) in encrypted packets to calculate the WEP
key.
•
Limiting the power level on associated client devices—When a client device associates to the
WMIC, the WMIC sends the maximum allowed power level setting to the client.
To disable the Aironet extensions
, follow these steps, beginning in privileged EXEC mode:
If you change the radio to a role that requires Aironet extensions, the Aironet extensions are enabled
automatically:
wmic1(config)#
int dot 0
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
interface dot11radio 0
Enters interface configuration mode for the radio interface.
Step 3
station-role root ap-only
Enters the station role. Root enables the access point mode.
Step 4
no dot11 extension aironet
Enters the
extension aironet
command to disable extensions.
Step 5
end
Returns to privileged EXEC mode.
Step 6
copy running-config startup-config
(Optional) Saves your entries in the configuration file.