7-5
Wireless Security Configuration
Overview
Overview
This chapter describes how to:
■ Configure wireless security
■ Configure encryption
■ Configure key management
■ Configure MAC and 802.1X authentication
■ Configure MAC Lockout and Client/Station Deauthentication
■ Configure AP Authentication
■ Configure Web Authentication