beautypg.com

Security parameter dependencies, Security parameter dependencies -22, Ils, refer to – H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 276: Table 31-12

background image

31-22

Figure 31-21 psk port security configuration page

Table 31-11

shows the psk port security configuration items.

Table 31-11 psk port security configuration items

Item

Description

Port Mode

psk: An access user must use the pre-shared key (PSK) that is pre-configured to negotiate
with the device. The access to the port is allowed only after the negotiation succeeds.

Max User

Control the maximum number of users allowed to access the network through the port.

Pre-shared Key

pass-phrase: Enter a PSK in the form of a character string. You should enter a string
that can be displayed and is of 8 to 63 characters.

raw-key: Enter a PSK in the form of a hexadecimal number. You should input a valid
64-bit hexadecimal number.

3) Configuring

userlogin-secure-ext

Perform the configurations as shown in

Configuring userlogin-secure/userlogin-secure-ext

.

Security Parameter Dependencies

In a clear-type wireless service or crypto-type wireless service, the security parameter dependencies

are as shown in

Table 31-12

.

Table 31-12 Security parameter dependencies

Service

type

Authentication

mode

Encryption

type

Security IE

WEP

encryption/key

ID

Port mode

Clear Open-System Unavailable

Unavailable

Unavailable

mac-authentication

mac-else-userlogin-secure

mac-else-userlogin-secure-ext

userlogin-secure

userlogin-secure-ext

userlogin-secure-or-mac

userlogin-secure-or-mac-ext