beautypg.com

Protocols and standards, Configuring wlan security, Configuration task list – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 67: Enabling an authentication method

background image

55

NOTE:

For more information about access authentication, see

Security Configuration Guide.

Protocols and standards

IEEE Standard for Information technology—Telecommunications and information exchange
between systems— Local and metropolitan area networks— Specific requirements -2004

Wi-Fi Protected Access—Enhanced Security Implementation Based On IEEE P802.11i Standard-Aug

2004

Information technology—Telecommunications and information exchange between systems—Local
and metropolitan area networks—Specific requirements—802.11, 1999

IEEE Standard for Local and metropolitan area networks "Port-Based Network Access Control"
802.1X™- 2004

802.11i IEEE Standard for Information technology—Telecommunications and information exchange
between systems—Local and metropolitan area networks—Specific requirements

Configuring WLAN security

Configuration task list

To configure WLAN security in a service template, map the service template to a radio policy, and add

radios to the radio policy. The SSID name, advertisement setting (beaconing), and encryption settings
are configured in the service template. You can configure an SSID to support any combination of WPA,

RSN, and Pre-RSN clients
Complete these tasks to configure WLAN security:

Task Remarks

Enabling an authentication method

Required

Configuring the PTK lifetime

Optional

Configuring the GTK rekey method

Optional

Configuring security IE

Required

Configuring cipher suite

Required

Configuring port security

Optional

Enabling an authentication method

You can enable open system or shared key authentication or both.
To enable an authentication method:

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enter WLAN service
template view.

wlan service-template
service-template-number crypto

N/A