– 212 –
27 WIRELESS SECURITY COMMANDS
The commands described in this section configure parameters for wireless
security on the VAP interfaces.
auth This command configures authentication for the VAP interface.
SYNTAX
auth <open-system | shared-key | wpa | wpa-psk | wpa2 |
wpa2-psk | wpa-wpa2-mixed | wpa-wpa2-psk-mixed>
open-system - Accepts the client without verifying its identity
using a shared key. “Open” authentication means either there is no
encryption (if encryption is disabled) or WEP-only encryption is used
(if encryption is enabled).
shared-key - Authentication is based on a WEP shared key that
has been distributed to all stations.
wpa - Clients using WPA are accepted for authentication.
wpa-psk - Clients using WPA with a Pre-shared Key are accepted
for authentication.
wpa2 - Clients using WPA2 are accepted for authentication.
wpa2-psk - Clients using WPA2 with a Pre-shared Key are
accepted for authentication.
Table 24: Wireless Security Commands
Command Function Mode Page
auth Defines the 802.11 authentication type allowed by
the access point
IC-W-
VAP
215
encryption Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-
VAP
214
key Sets the keys used for WEP encryption IC-W 215
transmit-key Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-
VAP
216
cipher-suite Selects an encryption method for the global key
used for multicast and broadcast traffic
IC-W-
VAP
217
wpa-pre-shared-key Defines a WPA preshared-key value IC-W-
VAP
218
pmksa-lifetime Sets the lifetime PMK security associations IC-W-
VAP
219
make-security-effective Implements wireless security changes made in
current CLI session
IC-W-
VAP
219