H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 16

Advertising
background image

x

Basic Message Exchange Process of RADIUS ............................................................................38-2

RADIUS Packet Format.................................................................................................................38-3

Extended RADIUS Attributes ........................................................................................................38-6

Protocols and Standards.......................................................................................................................38-7

Configuring RADIUS .............................................................................................................................38-7

Configuration Task List..................................................................................................................38-7

Configuring RADIUS Servers ........................................................................................................38-8

Configuring RADIUS Parameters..................................................................................................38-9

RADIUS Configuration Example .........................................................................................................38-12

Configuration Guidelines.....................................................................................................................38-18

39 Local EAP Service .................................................................................................................................39-1

Overview ...............................................................................................................................................39-1

Configuring Local EAP Service.............................................................................................................39-1

Local EAP Service Configuration Example...........................................................................................39-2

40 Users.......................................................................................................................................................40-1

Overview ...............................................................................................................................................40-1

Configuring Users .................................................................................................................................40-2

Configuring a Local User ...............................................................................................................40-2

Configuring a User Group .............................................................................................................40-4

Configuring a Guest.......................................................................................................................40-5

Configuring a User Profile .............................................................................................................40-6

41 PKI ...........................................................................................................................................................41-1

PKI Overview ........................................................................................................................................41-1

PKI Terms......................................................................................................................................41-1

Architecture of PKI.........................................................................................................................41-2

Applications of PKI ........................................................................................................................41-3

Operation of PKI ............................................................................................................................41-3

Configuring PKI .....................................................................................................................................41-3

Configuration Task List..................................................................................................................41-3

Creating a PKI Entity .....................................................................................................................41-6

Creating a PKI Domain..................................................................................................................41-7

Generating an RSA Key Pair.........................................................................................................41-9

Destroying the RSA Key Pair ......................................................................................................41-10

Retrieving a Certificate ................................................................................................................41-10

Requesting a Local Certificate ....................................................................................................41-12

Retrieving and Displaying a CRL ................................................................................................41-13

PKI Configuration Example .................................................................................................................41-13

Configuring a PKI Entity to Request a Certificate from a CA ......................................................41-13

Configuration Guidelines.....................................................................................................................41-19

42 WLAN Security Configuration ..............................................................................................................42-1

WLAN Security Overview......................................................................................................................42-1

Terminology...................................................................................................................................42-1

WIDS Attack Detection ..................................................................................................................42-4

Frame Filtering ..............................................................................................................................42-4

Advertising