EasyManua.ls Logo

H3C MSR Series

H3C MSR Series
80 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ii
Configuring WLAN security ······························································ 33
Overview ································································································································ 33
Authentication modes ········································································································· 33
WLAN data security ··········································································································· 34
Client access authentication ································································································ 35
Protocols and standards ····································································································· 35
Hardware compatibility with WLAN ······························································································ 35
Configuring WLAN security ········································································································ 36
Configuration task list ········································································································· 36
Enabling an authentication method ······················································································· 36
Configuring the PTK lifetime ································································································ 36
Configuring the GTK rekey method ······················································································· 37
Configuring security IE ······································································································· 38
Configuring cipher suite ······································································································ 38
Configuring port security ····································································································· 40
Displaying and maintaining WLAN security ············································································· 41
WLAN security configuration examples ························································································· 42
PSK authentication configuration example ·············································································· 42
MAC and PSK authentication configuration example ································································· 43
802.1X authentication configuration example ··········································································· 47
Supported combinations for ciphers ····························································································· 52
Configuring WLAN IDS ···································································· 55
Overview ································································································································ 55
Terminology ····················································································································· 55
Attack detection ················································································································ 55
Blacklist and white list ········································································································ 56
Hardware compatibility with WLAN ······························································································ 57
WLAN IDS configuration task list ································································································· 57
Configuring AP operating mode ·································································································· 58
Configuring attack detection ······································································································· 58
Configuring attack detection ································································································ 58
Displaying and maintaining attack detection ············································································ 58
Configuring blacklist and whitelist ································································································ 59
Configuring static lists ········································································································ 59
Configuring dynamic blacklist ······························································································· 59
Displaying and maintaining blacklist and whitelist ····································································· 60
WLAN IDS configuration examples ······························································································ 60
WLAN IDS configuration example ························································································· 60
Blacklist and whitelist configuration example ··········································································· 61
Configuring WLAN QoS ··································································· 62
Overview ································································································································ 62
Terminology ····················································································································· 62
WMM protocol ·················································································································· 62
Protocols and standards ····································································································· 64
Hardware compatibility with WLAN ······························································································ 64
Configuring WMM ···················································································································· 64
Configuration restrictions and guidelines ················································································ 64
Configuration procedure ····································································································· 65
Displaying and maintaining WMM ························································································· 66
WMM configuration examples ······························································································ 66
Troubleshooting ················································································································ 69
Configuring client rate limiting ····································································································· 70
Configuration procedure ····································································································· 70
Displaying and maintaining client rate limiting ·········································································· 70
Client rate limiting configuration example ················································································ 71
Index ··························································································· 73

Table of Contents

Other manuals for H3C MSR Series

Related product manuals