42
Task Command Remarks
information or statistics.
statistics
] [
interface
interface-list ]
[
|
{
begin
|
exclude
|
include
}
regular-expression ]
WLAN security configuration examples
PSK authentication configuration example
Network requirements
As shown in Figure 13, perform PSK authentication with key 12345678 on the client.
Figure 13 Network diagram
Configuration procedure
# Enable port security.
<Sysname> system-view
[Sysname] port-security enable
# Configure the authentication mode as PSK, and the pre-shared key as 123 45678, and enable
802.11 key negotiation.
[Sysname] interface wlan-bss 1
[Sysname-WLAN-BSS1] port-security port-mode psk
[Sysname-WLAN-BSS1] port-security preshared-key pass-phrase 12345678
[Sysname-WLAN-BSS1] port-security tx-key-type 11key
[Sysname-WLAN-BSS1] quit
# Create crypto-type service template 10 and configure its SSID as psktest, configure the
authentication method as open-system, and enable the service template.
[Sysname] wlan service-template 1 crypto
[Sysname-wlan-st-1] ssid psktest
[Sysname-wlan-st-1] security-ie rsn
[Sysname-wlan-st-1] cipher-suite ccmp
[Sysname-wlan-st-1] authentication-method open-system
[Sysname-wlan-st-1] service-template enable
[Sysname-wlan-st-1] quit
# Bind interface WLAN-BSS 1 to service template 1 on interface WLAN-radio 2/0.
[Sysname] interface wlan-radio 2/0
[Sysname-WLAN-Radio2/0] radio-type dot11g
[Sysname-WLAN-Radio2/0] service-template 1 interface wlan-bss 1
Verifying the configuration
• After the client has the same PSK configured, it can associate with the AP and access the
WLAN.