beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 8

background image

ii

Applying the AP group in a user profile ············································································································· 31

 

Displaying and maintaining AP group ················································································································ 31

 

Configuring SSID-based access control ······················································································································· 31

 

Configuring uplink detection ········································································································································· 32

 

Configuring uplink detection ································································································································ 32

 

Configuring AC hot backup ·········································································································································· 33

 

Enabling AC hot backup ······································································································································ 33

 

Configuring the VLAN ID of the port connected to the other AC ····································································· 34

 

Configuring the interval for sending heartbeat messages ················································································ 34

 

Configuring the delay for the AP to switch from the master AC to the backup AC ······································· 34

 

Displaying the AC connection state ···················································································································· 34

 

WLAN service configuration examples ······················································································································· 35

 

WLAN service configuration example ················································································································ 35

 

WLAN auto-AP configuration example ··············································································································· 36

 

AC-AP tunnel dual-link configuration example ··································································································· 37

 

Configuration example for CAPWAP tunnel encryption with IPsec ································································· 39

 

Example for configuring fit APs on an AC ········································································································· 41

 

802.11n configuration example ························································································································· 43

 

User isolation configuration example ·················································································································· 44

 

Uplink detection configuration example ············································································································· 45

 

AP group configuration examples ································································································································ 46

 

AP group configuration without roaming ··········································································································· 46

 

AP group configuration for inter-AC roaming ···································································································· 48

 

Configuring WLAN security ······································································································································ 52

 

Authentication modes ············································································································································ 52

 

WLAN data security ············································································································································· 53

 

Client access authentication ································································································································· 54

 

Protocols and standards ······································································································································· 55

 

Configuring WLAN security ·········································································································································· 55

 

Configuration task list ··········································································································································· 55

 

Enabling an authentication method ····················································································································· 55

 

Configuring the PTK lifetime ································································································································· 56

 

Configuring the GTK rekey method ····················································································································· 56

 

Configuring security IE ·········································································································································· 57

 

Configuring cipher suite ······································································································································· 58

 

Configuring port security ······································································································································ 60

 

Displaying and maintaining WLAN security ······································································································ 62

 

WLAN security configuration examples ······················································································································ 63

 

PSK authentication configuration example ········································································································· 63

 

MAC and PSK authentication configuration example ······················································································· 64

 

802.1X authentication configuration example ·································································································· 69

 

Dynamic WEP encryption-802.1X authentication configuration example ······················································ 77

 

Supported combinations for ciphers ···························································································································· 82

 

Configuring WLAN roaming ····································································································································· 85

 

WLAN roaming overview ············································································································································· 85

 

Terminology ··························································································································································· 85

 

WLAN roaming topologies ·································································································································· 85

 

Configuring an IACTP mobility group ·························································································································· 89

 

Displaying and maintaining WLAN roaming ············································································································· 90

 

WLAN roaming configuration examples ····················································································································· 91

 

Intra-AC roaming configuration example ··········································································································· 91

 

Inter-AC roaming configuration example············································································································ 93