H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 16

x
RADIUS Packet Format.................................................................................................................38-3
Extended RADIUS Attributes ........................................................................................................38-6
Protocols and Standards.......................................................................................................................38-7
Configuring RADIUS .............................................................................................................................38-7
Configuration Task List..................................................................................................................38-7
Configuring RADIUS Servers ........................................................................................................38-8
RADIUS Configuration Example .........................................................................................................38-12
Configuration Guidelines.....................................................................................................................38-18
39 Local EAP Service .................................................................................................................................39-1
Overview ...............................................................................................................................................39-1
Configuring Local EAP Service.............................................................................................................39-1
Local EAP Service Configuration Example...........................................................................................39-2
40 Users.......................................................................................................................................................40-1
Overview ...............................................................................................................................................40-1
Configuring Users .................................................................................................................................40-2
Configuring a Local User ...............................................................................................................40-2
Configuring a User Group .............................................................................................................40-4
Configuring a Guest.......................................................................................................................40-5
Configuring a User Profile .............................................................................................................40-6
41 PKI ...........................................................................................................................................................41-1
PKI Overview ........................................................................................................................................41-1
PKI Terms......................................................................................................................................41-1
Architecture of PKI.........................................................................................................................41-2
Applications of PKI ........................................................................................................................41-3
Operation of PKI ............................................................................................................................41-3
Configuring PKI .....................................................................................................................................41-3
Configuration Task List..................................................................................................................41-3
Creating a PKI Entity .....................................................................................................................41-6
Creating a PKI Domain..................................................................................................................41-7
Generating an RSA Key Pair.........................................................................................................41-9
Destroying the RSA Key Pair ......................................................................................................41-10
Retrieving a Certificate ................................................................................................................41-10
Requesting a Local Certificate ....................................................................................................41-12
PKI Configuration Example .................................................................................................................41-13
Configuration Guidelines.....................................................................................................................41-19
42 WLAN Security Configuration ..............................................................................................................42-1
WLAN Security Overview......................................................................................................................42-1
Terminology...................................................................................................................................42-1
WIDS Attack Detection ..................................................................................................................42-4
Frame Filtering ..............................................................................................................................42-4