Security parameter dependencies, Security parameter dependencies -22, Ils, refer to – H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 276: Table 31-12
31-22
Figure 31-21 psk port security configuration page
shows the psk port security configuration items.
Table 31-11 psk port security configuration items
Item
Description
Port Mode
psk: An access user must use the pre-shared key (PSK) that is pre-configured to negotiate
with the device. The access to the port is allowed only after the negotiation succeeds.
Max User
Control the maximum number of users allowed to access the network through the port.
Pre-shared Key
pass-phrase: Enter a PSK in the form of a character string. You should enter a string
that can be displayed and is of 8 to 63 characters.
raw-key: Enter a PSK in the form of a hexadecimal number. You should input a valid
64-bit hexadecimal number.
3) Configuring
userlogin-secure-ext
Perform the configurations as shown in
Configuring userlogin-secure/userlogin-secure-ext
.
Security Parameter Dependencies
In a clear-type wireless service or crypto-type wireless service, the security parameter dependencies
are as shown in
.
Table 31-12 Security parameter dependencies
Service
type
Authentication
mode
Encryption
type
Security IE
WEP
encryption/key
ID
Port mode
Clear Open-System Unavailable
Unavailable
Unavailable
mac-authentication
mac-else-userlogin-secure
mac-else-userlogin-secure-ext
userlogin-secure
userlogin-secure-ext
userlogin-secure-or-mac
userlogin-secure-or-mac-ext