![HP a-msr Скачать руководство пользователя страница 39](http://html.mh-extra.com/html/hp/a-msr/a-msr_configuration-manual_163018039.webp)
35
To do…
Use the command…
Remarks
3.
Enable the TKIP cipher suite.
cipher-suite
tkip
Required.
By default, no cipher suite is
enabled.
4.
Configure the TKIP
countermeasure interval.
tkip-cm-time
time
Optional.
The default countermeasure
interval is 0 seconds. No
countermeasures are taken.
MIC is used to prevent attackers from data modification. It ensures data security by using the Michael
algorithm. When a fault occurs to the MIC, the device considers that the data has been modified and the
system is being attacked. Upon detecting the attack, TKIP suspends within the countermeasure interval. No
TKIP associations can be established within the interval.
Configuring CCMP cipher suite
CCMP adopts the AES encryption algorithm.
To configure the CCMP cipher suite:
To do…
Use the command…
Remarks
1.
Enter system view.
system-view
—
2.
Enter WLAN service
template view.
wlan service-template
service-template-number
crypto
—
3.
Enable the CCMP cipher
suite.
cipher-suite ccmp
Required.
By default, no cipher suite is
enabled.
Configuring port security
The authentication type configuration includes the following options:
PSK
802.1x
MAC
PSK and MAC
This document describes only several common port security modes. For more information about other port
security modes, see
Security Configuration Guide
.
Before configuring port security, you must:
1.
Create the wireless port.
2.
Enable port security.
Configuring PSK authentication
To configure PSK authentication:
To do…
Use the command…
Remarks
1.
Enter system view.
system-view
—
Содержание a-msr
Страница 48: ...44 Figure 19 Configure the wireless card I ...
Страница 49: ...45 Figure 20 Configure the wireless card II ...