H3C Technologies H3C WA2600 Series WLAN Access Points User Manual

Page 6

Advertising
background image

i

Table of Contents

1 Applicable Models and Software Versions .............................................................................................1-1

2 Feature Matrix ............................................................................................................................................2-1

3 Command/Parameter Matrix.....................................................................................................................3-1

4 WLAN Interface Configuration .................................................................................................................4-1

Overview .................................................................................................................................................4-1

WLAN-Radio Interface ............................................................................................................................4-1

Introduction......................................................................................................................................4-1

Configuring a WLAN-Radio Interface ..............................................................................................4-1

WLAN-BSS Interface ..............................................................................................................................4-2

Introduction......................................................................................................................................4-2

Configuring a WLAN-BSS Interface ................................................................................................4-2

WLAN Mesh Interface .............................................................................................................................4-3

Introduction......................................................................................................................................4-3

Entering WLAN Mesh Interface View ..............................................................................................4-3

Configuring a WLAN Mesh Interface...............................................................................................4-3

WLAN Mesh Link Interface .....................................................................................................................4-3

Displaying and Maintaining a WLAN Interface .......................................................................................4-3

5 WLAN Security Configuration ..................................................................................................................5-1

WLAN Security Configuration .................................................................................................................5-1

Overview..........................................................................................................................................5-1

Authentication Modes ......................................................................................................................5-1

WLAN Data Security........................................................................................................................5-2

Client Access Authentication ...........................................................................................................5-3

Protocols and Standards .................................................................................................................5-4

Configuring WLAN Security ....................................................................................................................5-4

Enabling an Authentication Method.................................................................................................5-4

Configuring the PTK Lifetime ..........................................................................................................5-5

Configuring the GTK Rekey Method ...............................................................................................5-5

Configuring Security IE....................................................................................................................5-6

Configuring Cipher Suit ...................................................................................................................5-7

Configuring Port Security ................................................................................................................5-9

Displaying and Maintaining WLAN Security ..................................................................................5-11

WLAN Security Configuration Examples ..............................................................................................5-12

PSK Authentication Configuration Example ..................................................................................5-12

MAC-and-PSK Authentication Configuration Example .................................................................5-13

802.1X Authentication Configuration Example..............................................................................5-16

Dynamic WEP Encryption-802.1X Authentication Configuration Example ...................................5-23

Supported Combinations for Ciphers....................................................................................................5-25

Advertising
This manual is related to the following products: