H3C Technologies H3C WA2600 Series WLAN Access Points User Manual
Page 6
i
Table of Contents
1 Applicable Models and Software Versions .............................................................................................1-1
2 Feature Matrix ............................................................................................................................................2-1
3 Command/Parameter Matrix.....................................................................................................................3-1
4 WLAN Interface Configuration .................................................................................................................4-1
Overview .................................................................................................................................................4-1
WLAN-Radio Interface ............................................................................................................................4-1
Introduction......................................................................................................................................4-1
Configuring a WLAN-Radio Interface ..............................................................................................4-1
WLAN-BSS Interface ..............................................................................................................................4-2
Introduction......................................................................................................................................4-2
Configuring a WLAN-BSS Interface ................................................................................................4-2
WLAN Mesh Interface .............................................................................................................................4-3
Introduction......................................................................................................................................4-3
Configuring a WLAN Mesh Interface...............................................................................................4-3
WLAN Mesh Link Interface .....................................................................................................................4-3
Displaying and Maintaining a WLAN Interface .......................................................................................4-3
5 WLAN Security Configuration ..................................................................................................................5-1
WLAN Security Configuration .................................................................................................................5-1
Overview..........................................................................................................................................5-1
Authentication Modes ......................................................................................................................5-1
WLAN Data Security........................................................................................................................5-2
Client Access Authentication ...........................................................................................................5-3
Protocols and Standards .................................................................................................................5-4
Configuring WLAN Security ....................................................................................................................5-4
Enabling an Authentication Method.................................................................................................5-4
Configuring the PTK Lifetime ..........................................................................................................5-5
Configuring Security IE....................................................................................................................5-6
Configuring Cipher Suit ...................................................................................................................5-7
Configuring Port Security ................................................................................................................5-9
WLAN Security Configuration Examples ..............................................................................................5-12
Supported Combinations for Ciphers....................................................................................................5-25