9-127
Command Line Reference
Wireless Security Commands
Example
wep-default-key
This command defines a Wired Equivalent Privacy (WEP) key index used for
data encryption.
Syntax
wep-default-key <1 | 2 | 3 | 4>
•
<1 | 2 | 3 | 4>
- The wep key index (1-4).
Default Setting
1
Command Mode
WLAN Interface Configuration
Command Usage
•
Up to four WEP keys can be defined on each BSS, each identified by
a key index number.
•
A SSID can use any or all of its 4 WEP keys, thus one SSID can't
prevent another SSID from using any WEP keys.
•
To enable WEP encryption, first use the
security
command before
configuring a WEP key with this command.
•
When WEP is enabled, all wireless stations must be configured with
the same shared key to communicate with the access point’s SSID
interface.
•
When using IEEE 802.1X, the access point uses a dynamic WEP keys
to encrypt data sent to 802.1X-enabled stations. However, because the
access point sends the WEP keys during the 802.1X authentication
process, these keys do not have to appear in the client’s WEP key list.
ProCurve Access Point 530# configure
ProCurve Access Point 530(config)# radio 1
ProCurve Access Point 530(radio1)# wlan 1
ProCurve Access Point 530(radio1-wlan1)# security wpa-8021x
ProCurve Access Point 530(radio1-wlan1)# wpa-allowed
ProCurve Access Point 530(radio1-wlan1)# wpa2-allowed
ProCurve Access Point 530(radio1-wlan1)# rsn-
preauthentication
ProCurve Access Point 530(radio1-wlan1)#
Содержание ProCurve 530 NA
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration This page is intentionally unused ...
Страница 178: ...6 26 Wireless Interface Configuration Modifying Antenna Settings 6 Select Update to set the antenna parameters ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users This page is intentionally unused ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 475: ...A 1 A File Uploads Downloads and Resets ...
Страница 495: ...B 1 B Defaults ...
Страница 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 517: ...D 1 D Open Source Licenses ...
Страница 519: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Страница 555: ......