beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 16

background image

x

Configuring a local user ·············································································································································· 585

 

Configuring a user group ············································································································································ 587

 

Configuring a guest ····················································································································································· 588

 

Configuring a guest by a management level administrator ··········································································· 588

 

Configuring a guest by a guest administrator ·································································································· 589

 

Configuring a user profile ··········································································································································· 590

 

Configuration guidelines ···································································································································· 590

 

Configuration procedure ···································································································································· 591

 

Managing certificates ············································································································································· 594

 

Overview ······································································································································································· 594

 

Configuration guidelines ············································································································································· 594

 

Configuration procedures ··········································································································································· 595

 

Configuration procedure for manual request ··································································································· 595

 

Configuration procedure for automatic request ······························································································· 597

 

Creating a PKI entity ···················································································································································· 597

 

Creating a PKI domain ················································································································································ 599

 

Generating an RSA key pair······································································································································· 601

 

Destroying the RSA key pair ······································································································································· 602

 

Retrieving and displaying a certificate ······················································································································ 603

 

Requesting a local certificate ······································································································································ 604

 

Retrieving and displaying a CRL ································································································································ 605

 

Certificate management configuration example ······································································································· 606

 

Configuring WLAN security ··································································································································· 611

 

WLAN security overview ············································································································································· 611

 

Terminology ························································································································································· 611

 

WIDS attack detection ········································································································································ 613

 

Blacklist and whitelist ·········································································································································· 614

 

Configuring rogue device detection··························································································································· 615

 

Recommended configuration procedure ··········································································································· 615

 

Configuring AP operating mode ······················································································································· 616

 

Configuring detection rules ································································································································ 617

 

Configuring detection rule lists ··························································································································· 619

 

Enabling countermeasures and configuring aging time for detected rogue devices ··································· 620

 

Displaying monitor record ·································································································································· 621

 

Displaying history record···································································································································· 622

 

Configuring WIDS ······················································································································································· 622

 

Configuring WIDS ··············································································································································· 622

 

Displaying history record···································································································································· 623

 

Displaying statistics information ························································································································· 623

 

Configuring the blacklist and whitelist functions ······································································································· 624

 

Configuring dynamic blacklist ··························································································································· 624

 

Configuring static blacklist ································································································································· 625

 

Configuring whitelist ··········································································································································· 626

 

Rogue detection configuration example ···················································································································· 626

 

Configuring authorized IP ······································································································································ 631

 

Configuring user isolation ······································································································································ 632

 

User isolation overview ··············································································································································· 632

 

Before user isolation is enabled ························································································································· 632

 

After user isolation is enabled ··························································································································· 633

 

Configuring user isolation ··········································································································································· 633

 

Configuring user isolation ·································································································································· 633

 

Displaying user isolation information ················································································································ 634