Brocade Mobility 7131 Access Point Product Reference Guide (Supporting software release 4.4.0.0 and later) User Manual
Page 7
![background image](/manuals/361705/7/background.png)
Brocade Mobility 7131 Access Point Product Reference Guide
vii
53-1002517-01
Configuring Access Point Security
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189
Configuring Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Setting Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Resetting the Access Point Password. . . . . . . . . . . . . . . . . . . .192
Enabling Authentication and Encryption Schemes. . . . . . . . . . . . .192
Configuring Kerberos Authentication. . . . . . . . . . . . . . . . . . . . . . . .194
Configuring 802.1x EAP Authentication. . . . . . . . . . . . . . . . . . . . . .196
Configuring WEP Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
Configuring KeyGuard Encryption . . . . . . . . . . . . . . . . . . . . . . . . . .201
Configuring WPA/WPA2 Using TKIP . . . . . . . . . . . . . . . . . . . . . . . . .203
Configuring WPA2-CCMP (802.11i) . . . . . . . . . . . . . . . . . . . . . . . . .205
Configuring Multi Cipher Support. . . . . . . . . . . . . . . . . . . . . . . . . . .208
Configuring Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210
Configuring LAN to WAN Access . . . . . . . . . . . . . . . . . . . . . . . .212
Configuring Advanced Subnet Access . . . . . . . . . . . . . . . . . . .215
Configuring VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216
Creating a VPN Tunnel between Two Access Points . . . . . . . .219
Configuring Manual Key Settings . . . . . . . . . . . . . . . . . . . . . . .221
Configuring Auto Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . .224
Configuring IKE Key Settings. . . . . . . . . . . . . . . . . . . . . . . . . . .226
VPN Configuration - Example . . . . . . . . . . . . . . . . . . . . . . . . . .229
Viewing VPN Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230
Configuring Content Filtering Settings . . . . . . . . . . . . . . . . . . . . . . .231
Configuring Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . .234
Moving Rogue APs to the Allowed AP List . . . . . . . . . . . . . . . .236
Using MUs to Detect Rogue Devices. . . . . . . . . . . . . . . . . . . . .239
Configuring User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . .240
Configuring the Radius Server . . . . . . . . . . . . . . . . . . . . . . . . . 241
Configuring LDAP Authentication . . . . . . . . . . . . . . . . . . . . . . .242
Configuring a Proxy Radius Server . . . . . . . . . . . . . . . . . . . . . .244
Managing the Local User Database . . . . . . . . . . . . . . . . . . . . .246
Defining User Access Permissions by Group . . . . . . . . . . . . . .248
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253
Viewing WAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253
Viewing LAN Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256
Viewing STP Statistics for a LAN . . . . . . . . . . . . . . . . . . . . . . . .258
Viewing IP Filter Statistics for a LAN . . . . . . . . . . . . . . . . . . . . .260
Viewing Wireless Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261
Viewing WLAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .262
Viewing IP Filter Statistics for a WLAN . . . . . . . . . . . . . . . . . . .265