H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 10

Advertising
background image

iv

Portal configuration examples ···································································································································· 177

 

Configuring direct portal authentication ··········································································································· 177

 

Configuring re-DHCP portal authentication ······································································································ 184

 

Configuring direct portal authentication with extended functions·································································· 186

 

Configuring re-DHCP portal authentication with extended functions ···························································· 188

 

Configuring portal stateful failover ···················································································································· 190

 

Configuring portal server detection and portal user information synchronization ······································· 202

 

Configuring direct portal authentication using local portal server ································································· 211

 

Configuring portal stateful failover with local portal servers ·········································································· 213

 

Troubleshooting portal ················································································································································· 220

 

Inconsistent keys on the access device and the portal server ········································································· 220

 

Incorrect server port number on the access device ·························································································· 220

 

Configuring port security ········································································································································ 221

 

Overview ······································································································································································· 221

 

Port security features ··········································································································································· 221

 

Port security modes ············································································································································· 222

 

Support for WLAN ·············································································································································· 224

 

Support for guest VLAN and Auth-Fail VLAN ··································································································· 225

 

Port security configuration task list ····························································································································· 225

 

Enabling port security ·················································································································································· 226

 

Setting port security's limit on the number of MAC addresses on a port······························································· 226

 

Setting the port security mode ···································································································································· 227

 

Configuring port security features ······························································································································ 228

 

Configuring NTK ················································································································································· 228

 

Configuring intrusion protection ························································································································ 228

 

Enabling port security traps ································································································································ 229

 

Configuring port security for WLAN ports ················································································································ 229

 

Configuration guidelines ···································································································································· 229

 

Setting the port security mode of a WLAN port······························································································· 230

 

Enabling key negotiation ···································································································································· 230

 

Configuring a PSK ··············································································································································· 231

 

Ignoring authorization information from the server ·································································································· 231

 

Enabling remote authentication proxy ······················································································································· 231

 

Displaying and maintaining port security ·················································································································· 232

 

Port security configuration examples ························································································································· 232

 

Configuring the userLoginWithOUI mode ········································································································ 232

 

Configuring the userLoginSecureExt mode on a WLAN port ········································································· 236

 

Configuring an 802.1X guest VLAN for a port security-enabled port ·························································· 240

 

Configuring port security with guest VLAN and VLAN assignment ······························································· 242

 

Troubleshooting port security ······································································································································ 245

 

Cannot set the port security mode ····················································································································· 245

 

Configuring a user profile ······································································································································ 247

 

Overview ······································································································································································· 247

 

User profile configuration task list ······························································································································ 247

 

Creating a user profile ················································································································································ 247

 

Performing configurations in user profile view ········································································································· 248

 

Enabling a user profile ················································································································································ 248

 

Displaying and maintaining user profile ··················································································································· 248

 

Configuring password control ································································································································ 249

 

Overview ······································································································································································· 249

 

Password control configuration task list ····················································································································· 251

 

Configuring password control ···································································································································· 252

 

Enabling password control ································································································································· 252

 

Advertising