Extreme Networks Summit 300-48 User Manual

Page 93

Advertising
background image

Example Wireless Configuration Process

Summit 300-48 Switch Software User Guide

93

If you enter the wrong number of characters for the code, a message similar to the following
appears.

Invalid number of bytes in key. Expected 10 bytes, got 15 bytes.

8

Configure the security profile to use the 0 key you just defined as the default encryption key.

configure security-profile wep-secure wep default-key-index 0

To configure dot1x security, follow these steps:

1

Create a security profile (

dot1x-secure

) by copying from the default unsecure profile.

create security-profile dot1x-secure copy unsecure

2

Configure the security profile for all levels of dot1x authentication.

configure security-profile dot1x-secure dot1x authentication all

3

Configure the security profile with the dot1x authentication suite.

configure security-profile dot1x-secure dot1x auth-suite dot1x

4

Configure the security profile to use WEP as the cipher method for multicast messages. This
automatically applies to unicast messages as well.

configure security-profile dot1x-secure dot1x multicast-cipher wep

5

Configure an encryption length of 128 for the security profile. You also need to configure the
RADIUS server for dot1x authentication. There is a special command

enable radius wireless

to

enable radius for wireless access. See “Policies and RADIUS Support” on page 88 for more
information.

configure security-profile dot1x-secure encryption-length 128

To assign profiles to ports, follow these steps:

1

Configure interface 1 on port 1:5 to use the RF profile

RF_A

.

configure wireless ports 1:5 interface 1 rf-profile RF_A

2

Configure interface 2 on port 1:5 to use the RF profile

RF_G

.

configure wireless ports 1:5 interface 2 rf-profile RF_G

3

Configure interfaces 1 and 2 on port 1:5 to use the

wep-secure

security profile or the

dotx1x-secure

security profile.

configure wireless ports 1:5 interface 1 security-profile wep-secure

configure wireless ports 1:5 interface 2 security-profile wep-secure

OR

configure wireless port 1:5 interface 1 security-profile dot1x-secure

configure wireless port 1:5 interface 2 security-profile dot1x-secure

4

Configure the channel on the A and the B interface. Specifying 0 as the channel indicates that the
least interfering channel should be selected by the interface.

configure wireless ports 1:5 interface 1 channel 0

configure wireless ports 1:5 interface 2 channel 11

Advertising