beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 13

background image

viii

Configuring a guest ····················································································································································· 444

 

Configuring a user profile ··········································································································································· 447

 

Managing certificates ············································································································································· 450

 

PKI overview ································································································································································· 450

 

Configuring PKI ···························································································································································· 450

 

Recommended configuration procedure for manual request ·········································································· 451

 

Recommended configuration procedure for automatic request ······································································ 452

 

Creating a PKI entity ··········································································································································· 453

 

Creating a PKI domain ······································································································································· 454

 

Generating an RSA key pair ······························································································································ 457

 

Destroying the RSA key pair ······························································································································ 458

 

Retrieving and displaying a certificate ············································································································· 458

 

Requesting a local certificate ····························································································································· 459

 

Retrieving and displaying a CRL ························································································································ 460

 

Certificate management configuration example ······································································································· 461

 

Configuration guidelines ············································································································································· 466

 

WLAN security configuration ································································································································· 467

 

WLAN security overview ············································································································································· 467

 

Terminology ························································································································································· 467

 

WIDS attack detection ········································································································································ 469

 

Blacklist and white list ········································································································································· 470

 

Configuring rogue device detection··························································································································· 471

 

Recommended configure procedure ················································································································· 471

 

Configuring AP operating mode ······················································································································· 471

 

Configuring detection rules ································································································································ 472

 

Configuring detection rule lists ··························································································································· 475

 

Enabling countermeasures and configuring aging time for detected rogue devices ··································· 476

 

Displaying monitor record ·································································································································· 477

 

Displaying history record···································································································································· 478

 

Configuring WIDS ······················································································································································· 479

 

Configuring WIDS ··············································································································································· 479

 

Displaying history record···································································································································· 479

 

Displaying statistics information ························································································································· 480

 

Configuring the blacklist and white list functions ····································································································· 480

 

Configuring dynamic blacklist ··························································································································· 481

 

Configuring static blacklist ································································································································· 481

 

Configuring white list ·········································································································································· 483

 

Rogue detection configuration example ···················································································································· 484

 

User isolation ··························································································································································· 487

 

User isolation overview ··············································································································································· 487

 

Before user isolation is enabled ························································································································· 487

 

After user isolation is enabled ··························································································································· 488

 

Configuring user isolation ··········································································································································· 488

 

Configuring user isolation ·································································································································· 488

 

Displaying user isolation information ················································································································ 489

 

User isolation configuration example ························································································································ 489

 

Authorized IP ··························································································································································· 491

 

Overview ······································································································································································· 491

 

Configuring authorized IP ··········································································································································· 491

 

Configuring ACL and QoS ····································································································································· 493

 

ACL overview ······························································································································································· 493

 

QoS overview ······························································································································································· 493