beautypg.com
ii
Configuring 802.11n protection mode ·············································································································· 31
Configuring scan parameters ······································································································································· 32
Displaying and maintaining WLAN RRM···················································································································· 32
Configuring WLAN security ······································································································································ 33
Overview ········································································································································································· 33
Authentication modes ············································································································································ 33
WLAN data security ············································································································································· 34
Client access authentication ································································································································· 35
Protocols and standards ······································································································································· 35
Configuring WLAN security ·········································································································································· 36
Configuration task list ··········································································································································· 36
Enabling an authentication method ····················································································································· 36
Configuring the PTK lifetime ································································································································· 37
Configuring the GTK rekey method ····················································································································· 37
Configuring security IE ·········································································································································· 38
Configuring cipher suite ······································································································································· 39
Configuring port security ······································································································································ 40
Displaying and maintaining WLAN security ······································································································ 42
WLAN security configuration examples ······················································································································ 42
PSK authentication configuration example ········································································································· 42
MAC and PSK authentication configuration example ······················································································· 43
802.1X authentication configuration example ·································································································· 48
Supported combinations for ciphers ···························································································································· 53
Configuring WLAN IDS ············································································································································· 56
Overview ········································································································································································· 56
Terminology ··························································································································································· 56
Attack detection ····················································································································································· 56
Blacklist and white list ··········································································································································· 57
WLAN IDS configuration task list ································································································································· 58
Configuring AP operating mode ·································································································································· 59
Configuring attack detection ········································································································································· 59
Configuring attack detection ································································································································ 59
Displaying and maintaining attack detection ····································································································· 59
Configuring blacklist and whitelist ······························································································································· 60
Configuring static lists ··········································································································································· 60
Configuring dynamic blacklist ····························································································································· 60
Displaying and maintaining blacklist and whitelist ··························································································· 61
WLAN IDS configuration examples ····························································································································· 61
WLAN IDS configuration example ······················································································································ 61
Blacklist and whitelist configuration example ···································································································· 62
Configuring WLAN QoS ··········································································································································· 63
Overview ········································································································································································· 63
Terminology ··························································································································································· 63
WMM protocol ······················································································································································ 63
Protocols and standards ······································································································································· 65
Configuring WMM ························································································································································ 65
Configuration restrictions and guidelines ··········································································································· 65
Configuration procedure ······································································································································ 66
Displaying and maintaining WMM ···················································································································· 67
WMM configuration examples ···························································································································· 67
Troubleshooting ····················································································································································· 71
Configuring client rate limiting ····································································································································· 71
Configuration procedure ······································································································································ 72