beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 13

background image

vii

Configuring auto AP ···················································································································································· 308

 

Enabling auto AP ················································································································································· 308

 

Configuring auto-AP authentication ··················································································································· 309

 

Converting auto APs to configured APs ············································································································ 312

 

Configuring an AP group ············································································································································ 313

 

Creating an AP group ········································································································································· 313

 

Configuring IP address match criteria for an AP group ·················································································· 314

 

Adding an AP to an AP group ··························································································································· 315

 

Configuring an AP group ··································································································································· 316

 

Configuring AP-based client access control ·············································································································· 320

 

Configuring a user profile ·································································································································· 320

 

AP configuration examples ········································································································································· 322

 

Auto AP configuration example ························································································································· 322

 

Auto-AP authentication configuration example ································································································ 326

 

Configuring access services ··································································································································· 330

 

Access service overview ·············································································································································· 330

 

Terminology ························································································································································· 330

 

Client access ························································································································································ 330

 

WLAN data security ··········································································································································· 333

 

Client access authentication ······························································································································· 334

 

Configuring access service ········································································································································· 336

 

Recommended configuration procedure ··········································································································· 336

 

Creating a WLAN service ·································································································································· 336

 

Configuring clear-type wireless service ············································································································· 337

 

Configuring crypto-type wireless service ·········································································································· 348

 

Security parameter dependencies ····················································································································· 360

 

Configuring an authentication mode ················································································································ 361

 

Configuring source IP address verification ······································································································· 363

 

Enabling a wireless service ································································································································ 366

 

Binding an AP radio to a wireless service ········································································································ 366

 

Enabling a radio ················································································································································· 368

 

Displaying detailed information about a wireless service ·············································································· 368

 

Configuring policy-based forwarding ························································································································ 372

 

Creating a forwarding policy ···························································································································· 373

 

Applying a forwarding policy to an access service ························································································ 374

 

Applying a forwarding policy to a user profile ······························································································· 375

 

Wireless service configuration example ···················································································································· 375

 

WPA-PSK authentication configuration example ······································································································ 378

 

Local MAC authentication configuration example ··································································································· 383

 

Remote MAC authentication configuration example ································································································ 387

 

Remote 802.1X authentication configuration example ··························································································· 396

 

Dynamic WEP encryption-802.1X authentication configuration example ····························································· 407

 

Backup client authentication configuration example ································································································ 414

 

Local client authentication configuration example ··································································································· 421

 

Policy-based forwarding configuration example ······································································································ 426

 

Configuring mesh services ······································································································································ 431

 

Mesh overview ····························································································································································· 431

 

Basic concepts in WLAN mesh ·························································································································· 431

 

Advantages of WLAN mesh ······························································································································ 432

 

Deployment scenarios ········································································································································· 432

 

WLAN mesh security··········································································································································· 434

 

Mobile link switch protocol ································································································································ 435

 

Mesh network topologies ··································································································································· 436