Configuring gtk rekey based on packet, Configuring security ie, Configuring wpa security ie – H3C Technologies H3C MSR 50 User Manual

Page 47

Advertising
background image

38

Step Command

Remarks

165.

Configure the device to start
GTK rekey when a client

goes offline.

gtk-rekey client-offline enable

Optional.
By default, the device does not

start GTK rekey when a client
goes offline.
This command takes effect only
when you execute the gtk-rekey

enable command.

Configuring GTK rekey based on packet

Step Command

Remarks

166.

Enter system view.

system-view

N/A

167.

Enter WLAN service
template view.

wlan service-template
service-template-number crypto

N/A

168.

Enable GTK rekey.

gtk-rekey enable

By default, GTK rekey is enabled.

169.

Configure GTK rekey based
on packet.

gtk-rekey method packet-based
[ packet ]

The default packet number is
10000000.

170.

Configure the device to start
GTK rekey when a client

goes offline.

gtk-rekey client-offline enable

Optional.
By default, the device does not start
GTK rekey when a client goes offline.
This command takes effect only when
you execute the gtk-rekey enable

command.

Configuring security IE

Security IE configurations comprise WPA security IE configuration and RSN security IE configuration,

both of which require open system authentication.
WPA ensures greater protection than WEP. WPA operates in either WPA-PSK (or Personal) mode or

WPA-802.1X (or Enterprise) mode. In Personal mode, a pre-shared key or pass-phrase is used for

authentication. In Enterprise mode, 802.1X and RADIUS servers and the EAP are used for authentication.

Configuring WPA security IE

Step Command

Remarks

171.

Enter system view.

system-view

N/A

172.

Enter WLAN service

template view.

wlan service-template
service-template-number crypto

N/A

173.

Enable the WPA-IE in the
beacon and probe

responses.

security-ie wpa

By default, WPA-IE is disabled.

Advertising
This manual is related to the following products: