beautypg.com

Brocade Mobility 7131 Access Point Product Reference Guide (Supporting software release 4.4.0.0 and later) User Manual

Page 7

background image

Brocade Mobility 7131 Access Point Product Reference Guide

vii

53-1002517-01

Chapter 6

Configuring Access Point Security

In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189

Configuring Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190

Setting Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190

Resetting the Access Point Password. . . . . . . . . . . . . . . . . . . .192

Enabling Authentication and Encryption Schemes. . . . . . . . . . . . .192

Configuring Kerberos Authentication. . . . . . . . . . . . . . . . . . . . . . . .194

Configuring 802.1x EAP Authentication. . . . . . . . . . . . . . . . . . . . . .196

Configuring WEP Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199

Configuring KeyGuard Encryption . . . . . . . . . . . . . . . . . . . . . . . . . .201

Configuring WPA/WPA2 Using TKIP . . . . . . . . . . . . . . . . . . . . . . . . .203

Configuring WPA2-CCMP (802.11i) . . . . . . . . . . . . . . . . . . . . . . . . .205

Configuring Multi Cipher Support. . . . . . . . . . . . . . . . . . . . . . . . . . .208

Configuring Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210

Configuring LAN to WAN Access . . . . . . . . . . . . . . . . . . . . . . . .212
Configuring Advanced Subnet Access . . . . . . . . . . . . . . . . . . .215

Configuring VPN Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216

Creating a VPN Tunnel between Two Access Points . . . . . . . .219
Configuring Manual Key Settings . . . . . . . . . . . . . . . . . . . . . . .221
Configuring Auto Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . .224
Configuring IKE Key Settings. . . . . . . . . . . . . . . . . . . . . . . . . . .226
VPN Configuration - Example . . . . . . . . . . . . . . . . . . . . . . . . . .229
Viewing VPN Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230

Configuring Content Filtering Settings . . . . . . . . . . . . . . . . . . . . . . .231

Configuring Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . .234

Moving Rogue APs to the Allowed AP List . . . . . . . . . . . . . . . .236
Using MUs to Detect Rogue Devices. . . . . . . . . . . . . . . . . . . . .239

Configuring User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . .240

Configuring the Radius Server . . . . . . . . . . . . . . . . . . . . . . . . . 241
Configuring LDAP Authentication . . . . . . . . . . . . . . . . . . . . . . .242
Configuring a Proxy Radius Server . . . . . . . . . . . . . . . . . . . . . .244
Managing the Local User Database . . . . . . . . . . . . . . . . . . . . .246
Defining User Access Permissions by Group . . . . . . . . . . . . . .248

Chapter 7

Monitoring Statistics

In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253

Viewing WAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253

Viewing LAN Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256

Viewing STP Statistics for a LAN . . . . . . . . . . . . . . . . . . . . . . . .258
Viewing IP Filter Statistics for a LAN . . . . . . . . . . . . . . . . . . . . .260

Viewing Wireless Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261

Viewing WLAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .262
Viewing IP Filter Statistics for a WLAN . . . . . . . . . . . . . . . . . . .265