beautypg.com

H3C Technologies H3C MSR 50 User Manual

Page 8

background image

ii

Configuring 802.11n protection mode ·············································································································· 31

 

Configuring scan parameters ······································································································································· 32

 

Displaying and maintaining WLAN RRM···················································································································· 32

 

Configuring WLAN security ······································································································································ 33

 

Overview ········································································································································································· 33

 

Authentication modes ············································································································································ 33

 

WLAN data security ············································································································································· 34

 

Client access authentication ································································································································· 35

 

Protocols and standards ······································································································································· 35

 

Configuring WLAN security ·········································································································································· 36

 

Configuration task list ··········································································································································· 36

 

Enabling an authentication method ····················································································································· 36

 

Configuring the PTK lifetime ································································································································· 37

 

Configuring the GTK rekey method ····················································································································· 37

 

Configuring security IE ·········································································································································· 38

 

Configuring cipher suite ······································································································································· 39

 

Configuring port security ······································································································································ 40

 

Displaying and maintaining WLAN security ······································································································ 42

 

WLAN security configuration examples ······················································································································ 42

 

PSK authentication configuration example ········································································································· 42

 

MAC and PSK authentication configuration example ······················································································· 43

 

802.1X authentication configuration example ·································································································· 48

 

Supported combinations for ciphers ···························································································································· 53

 

Configuring WLAN IDS ············································································································································· 56

 

Overview ········································································································································································· 56

 

Terminology ··························································································································································· 56

 

Attack detection ····················································································································································· 56

 

Blacklist and white list ··········································································································································· 57

 

WLAN IDS configuration task list ································································································································· 58

 

Configuring AP operating mode ·································································································································· 59

 

Configuring attack detection ········································································································································· 59

 

Configuring attack detection ································································································································ 59

 

Displaying and maintaining attack detection ····································································································· 59

 

Configuring blacklist and whitelist ······························································································································· 60

 

Configuring static lists ··········································································································································· 60

 

Configuring dynamic blacklist ····························································································································· 60

 

Displaying and maintaining blacklist and whitelist ··························································································· 61

 

WLAN IDS configuration examples ····························································································································· 61

 

WLAN IDS configuration example ······················································································································ 61

 

Blacklist and whitelist configuration example ···································································································· 62

 

Configuring WLAN QoS ··········································································································································· 63

 

Overview ········································································································································································· 63

 

Terminology ··························································································································································· 63

 

WMM protocol ······················································································································································ 63

 

Protocols and standards ······································································································································· 65

 

Configuring WMM ························································································································································ 65

 

Configuration restrictions and guidelines ··········································································································· 65

 

Configuration procedure ······································································································································ 66

 

Displaying and maintaining WMM ···················································································································· 67

 

WMM configuration examples ···························································································································· 67

 

Troubleshooting ····················································································································································· 71

 

Configuring client rate limiting ····································································································································· 71

 

Configuration procedure ······································································································································ 72

 

This manual is related to the following products: