68
white list, 52
WIDS attack detection, 49
wireless client access, 9
wireless medium, 9
WLAN client isolation, 19
WLAN data security, 29
WLAN IDS
configuration, 49
flood attack detection, 49
IDS attack detection, 50
spoofing attack detection, 50
task list, 50
terminology, 49
weak IV detection, 50
WIDS attack detection, 49
WLAN IDS configuration, 49
WLAN IDS frame filtering
blacklist and white list, 52
configuration, 52
configuring, 53
displaying and maintaining, 54
example, 54
WLAN IDS frame filtering configuration, 52
WLAN IDS frame filtering example, 54
network requirements, 54
WLAN IDS task list, 50
WLAN IDS terminology, 49
WLAN interface
configuration, 1
configuring a radio interface, 1
configuring a WLAN-BSS interface, 1
configuring a WLAN-Ethernet interface, 3
displaying and maintaining, 8
entering WLAN-Ethernet interface view, 2
Ethernet interface, 2
WLAN-BSS interface, 1
WLAN interface configuration, 1
WLAN QoS
ACK policy, 57
CAC admission policies, 56
configuration, 55
displaying and maintaining WMM, 59
EDCA parameters, 56
protocols and standards, 57
SVP, 57
terminology, 55
troubleshooting, 63
U-APSD power-save mechanism, 57
WMM configuration, 57
WMM protocol overview, 55
WLAN QoS configuration, 55
WLAN QoS examples
CAC service configuration example, 60
network requirements, 59, 60, 62
SVP service example, 62
WMM basic configuration, 59
WMM configuration examples, 59
WLAN QoS protocols and standards, 57
WLAN QoS troubleshooting, 63
EDCA parameter configuration failure, 63
SVP or CAC configuration failure, 63
WLAN RRM
802.11b/802.11g rates, 23
802.11g protection, 26
802.11n rates, 24
configuration, 23
data transmit rates, 23
displaying and maintaining, 27
non-dot11h channel scanning, 26
task list, 23
WLAN RRM configuration, 23
WLAN RRM task list, 23
WLAN security
802.1X authentication, 36
authentication modes, 28
CCMP cipher suite, 35
cipher suite, 34
client access authentication, 30
configuration, 28
configuring WLAN security, 31
displaying and maintaining, 37
enabling an authentication method, 31
examples, 37
GTK rekey based on packet, 32
GTK rekey based on time, 32
GTK rekey method, 32
MAC authentication, 36
open system authentication, 28
port security, 35
pre-RSN, 48
protocols and standards, 30
PSK and MAC authentication, 36
PSK authentication, 35
PTK lifetime, 31
RSN, 46
RSN security IE, 33
security IE, 33
shared key authentication, 28
supported combinations for ciphers, 46
task list, 31
TKIP cipher suite, 34
WEP cipher suite, 34
Содержание a-msr
Страница 48: ...44 Figure 19 Configure the wireless card I ...
Страница 49: ...45 Figure 20 Configure the wireless card II ...