beautypg.com
viii
Configuring a guest ····················································································································································· 444
Configuring a user profile ··········································································································································· 447
Managing certificates ············································································································································· 450
PKI overview ································································································································································· 450
Configuring PKI ···························································································································································· 450
Recommended configuration procedure for manual request ·········································································· 451
Recommended configuration procedure for automatic request ······································································ 452
Creating a PKI entity ··········································································································································· 453
Creating a PKI domain ······································································································································· 454
Generating an RSA key pair ······························································································································ 457
Destroying the RSA key pair ······························································································································ 458
Retrieving and displaying a certificate ············································································································· 458
Requesting a local certificate ····························································································································· 459
Retrieving and displaying a CRL ························································································································ 460
Certificate management configuration example ······································································································· 461
Configuration guidelines ············································································································································· 466
WLAN security configuration ································································································································· 467
WLAN security overview ············································································································································· 467
Terminology ························································································································································· 467
WIDS attack detection ········································································································································ 469
Blacklist and white list ········································································································································· 470
Configuring rogue device detection··························································································································· 471
Recommended configure procedure ················································································································· 471
Configuring AP operating mode ······················································································································· 471
Configuring detection rules ································································································································ 472
Configuring detection rule lists ··························································································································· 475
Enabling countermeasures and configuring aging time for detected rogue devices ··································· 476
Displaying monitor record ·································································································································· 477
Displaying history record···································································································································· 478
Configuring WIDS ······················································································································································· 479
Configuring WIDS ··············································································································································· 479
Displaying history record···································································································································· 479
Displaying statistics information ························································································································· 480
Configuring the blacklist and white list functions ····································································································· 480
Configuring dynamic blacklist ··························································································································· 481
Configuring static blacklist ································································································································· 481
Configuring white list ·········································································································································· 483
Rogue detection configuration example ···················································································································· 484
User isolation ··························································································································································· 487
User isolation overview ··············································································································································· 487
Before user isolation is enabled ························································································································· 487
After user isolation is enabled ··························································································································· 488
Configuring user isolation ··········································································································································· 488
Configuring user isolation ·································································································································· 488
Displaying user isolation information ················································································································ 489
User isolation configuration example ························································································································ 489
Authorized IP ··························································································································································· 491
Overview ······································································································································································· 491
Configuring authorized IP ··········································································································································· 491
Configuring ACL and QoS ····································································································································· 493
ACL overview ······························································································································································· 493
QoS overview ······························································································································································· 493