EasyManua.ls Logo

ZyXEL Communications nwa series - Security Profile Example

ZyXEL Communications nwa series
144 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 8 Wireless LAN Profiles
NWA/WAC Series CLI Reference Guide
60
8.4.1 Security Profile Example
The following example creates a security profile with the name ‘SECURITY01’..
server-auth <1..2> IPv4 port port secret
secret
Sets the server authentication IPv4 port and shared secret.
[no] server-auth <1..2> Clears the server authentication setting.
wep <64 | 128> default-key <1..4> Sets the WEP encryption strength (64 or 128) and the default
key index (1 ~ 4).
wep-auth-type <open | share> Sets the authentication key type to either open or share.
wep-key <1..4> wep_key If you select WEP-64 enter 10 hexadecimal digits in the range of
A-F”, “a-f” and “0-9” (for example, 0x11AA22BB33) for each Key
used; or enter 5 ASCII characters (case sensitive) ranging from
“a-z”,A-Z” and “0-9” (for example, MyKey) for each Key used.
If you select WEP-128 enter 26 hexadecimal digits in the range of
A-F”, “a-f” and “0-9” (for example,
0x00112233445566778899AABBCC) for each Key used; or enter
13 ASCII characters (case sensitive) ranging from “a-z”, “A-Z”
and “0-9” (for example, MyKey12345678) for each Key used.
You can save up to four different keys. Enter the default-key (1
~ 4) to save your WEP to one of those four available slots.
wpa-encrypt <aes | auto> Sets the WPA/WPA2 encryption cipher type.
auto: This automatically chooses the best available cipher based
on the cipher in use by the wireless client that is attempting to
make a connection.
aes: This is the Advanced Encryption Standard encryption
method, a newer more robust algorithm than TKIP Not all
wireless clients may support this.
wpa-psk {wpa_key | wpa_key_64} Sets the WPA/WPA2 pre-shared key.
[no] wpa2-preauth Enables pre-authentication to allow wireless clients to switch APs
without having to re-authenticate their network connection. The
RADIUS server puts a temporary PMK Security Authorization
cache on the wireless clients. It contains their session ID and a
pre-authorized list of viable APs.
Use the no parameter to disable this.
[no] reauth <30..30000> Sets the interval (in seconds) between authentication requests.
The default is 0.
exit Exits configuration mode for this profile.
Table 26 Command Summary: Security Profile (continued)
COMMAND DESCRIPTION
Router(config)# wlan-security-profile SECURITY01
Router(config-security-profile)# mode wpa2
Router(config-security-profile)# wpa-encrypt aes
Router(config-security-profile)# wpa-psk 12345678
Router(config-security-profile)# idle 3600
Router(config-security-profile)# reauth 1800
Router(config-security-profile)# group-key 1800
Router(config-security-profile)# exit
Router(config)#

Table of Contents

Other manuals for ZyXEL Communications nwa series

Related product manuals