Brocade Mobility RFS7000-GR Controller System Reference Guide (Supporting software release 4.1.0.0-040GR and later) User Manual

Page 116

Advertising
background image

102

Brocade Mobility RFS7000-GR Controller System Reference Guide

53-1001944-01

Viewing and configuring switch WLANs

4

NOTE

If the WLAN is to support AAP, the Independent Mode (AAP Only) checkbox must be selected.
Additionally, the Access Point must have its auto discovery option enabled to be discovered by the
switch. For information on configuring an Access Point for AAP support, see

“Adaptive AP

management”

on page 488.

NOTE

For a RADIUS supported VLAN to function, the "Dynamic Assignment" checkbox must be enabled for
the WLAN supporting the VLAN.

NOTE

When configuring wireless settings for Adaptive APs all configuration must be done through the
switch and not from the AP management console. Making changes directly in the AP management
console can lead to unstable operation of the Adaptive AP.

7. Refer to the Authentication field to select amongst the following options:

8. Refer to the Encryption field to select amongst the following options:

9. Refer to the Advanced field for the following information:

802.1X EAP

A RADIUS server is used to authenticate users. For detailed information on
configuring EAP for the WLAN, see

“Configuring 802.1x EAP”

on page 105.

Hotspot

A Hotspot is used to authenticate users in a unique network segment (hotspot).
The attributes of both the hotspot and the RADIUS Server are required. For more
information, see

“Configuring hotspots”

on page 107.

MAC Authentication

The switch uses a RADIUS server to see if a target MAC address is allowed on the
network. The attributes of the RADIUS Server are required. For more information,
see

“Configuring MAC authentication”

on page 116

No Authentication

When selected, no Authentication is used and transmissions are made (in the
open) without security unless an encryption scheme is used. This setting is not
recommended when data protection is important.

WPA2-CCMP

WPA2 is a newer 802.11i standard that provides even stronger wireless security
than Wi-Fi Protected Access (WPA) and WEP. CCMP is the security standard used
by the Advanced Encryption Standard (AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the
proven Cipher Block Chaining (CBC) technique. Changing just one bit in a message
produces a totally different result. For detailed information on configuring CCMP
for the WLAN, see

“Configuring WPA/WPA2 using TKIP and CCMP”

on page 128.

Accounting Mode

If using a Syslog server to conduct accounting for the switch, select the Syslog
option from the Accounting Mode drop-down menu. Once selected, a Syslog Config
button is enabled on the bottom of the Network > Wireless LANs > Edit screen. Use
this sub screen to provide the Syslog Server IP address and port for the Syslog
Server performing the accounting function.
If either Hotspot, MAC Authentication or 802.1x EAP have been selected from
within the Authentication field, a RADIUS Config button is enabled (on the bottom
of the screen) allowing the user to define a Primary and Secondary RADIUS
Accounting Server IP address, port, shared secret password and timeout and retry.
Define these accounting settings as required for the switch.
The default Accounting Mode setting is Off.

Answer Broadcast ESS

Select this checkbox to allow the WLAN to respond to probes for broadcast ESS.

Advertising