User's Manual
Table Of Contents
- Chapter 1: Introduction 1-1
- Chapter 1: Introduction
- Chapter 2: Hardware Installation
- Chapter 3: Network Configuration
- Chapter 4: Initial Configuration
- Chapter 5: System Configuration
- Chapter 6: Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- snmp-server community
- snmp-server contact
- snmp-server location
- snmp-server enable server
- snmp-server host
- snmp-server trap
- snmp-server engine-id
- snmp-server user
- snmp-server targets
- snmp-server filter
- snmp-server filter-assignments
- show snmp groups
- show snmp users
- show snmp group-assignments
- show snmp target
- show snmp filter
- show snmp filter-assignments
- show snmp
- Flash/File Commands
- RADIUS Client
- 802.1X Authentication
- MAC Address Authentication
- Filtering Commands
- WDS Bridge Commands
- Spanning Tree Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- interface wireless
- vap
- speed
- multicast-data-rate
- channel
- transmit-power
- radio-mode
- preamble
- antenna control
- antenna id
- antenna location
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- super-g
- description
- ssid
- closed-system
- max-association
- assoc-timeout-interval
- auth-timeout-value
- shutdown
- show interface wireless
- show station
- Rogue AP Detection Commands
- Wireless Security Commands
- Link Integrity Commands
- IAPP Commands
- VLAN Commands
- WMM Commands
- Appendix A: Troubleshooting
- Appendix B: Cables and Pinouts
- Appendix C: Specifications
- Glossary
- Index
Radio Interface
5-79
5
CLI Commands for WPA Using Pre-shared Key Security – Be sure to first disable
802.1X port authentication using the 802.1X command from the configuration mode.
Then, from the 802.11g interface configuration mode, use the vap command to
access each VAP interface to configure other security settings.
From the VAP interface configuration mode, use the authentication command to
set the access point to “Open System.” Use the encryption command to enable
data encryption. To enable WPA to be required for all clients, use the wpa-clients
command. Set the broadcast and multicast key encryption using the
multicast-cipher command. Use the wpa-mode command to enable the
Pre-shared Key mode. To enter a key value, use the wpa-psk-type command to
specify a hexadecimal or alphanumeric key, and then use the wpa-pre-shared-key
command to define the key. To view the current security settings, use the show
interface wireless g 0 command (not shown in example).
Enterprise AP(config)#interface wireless g 6-88
Enter Wireless configuration commands, one per line.
Enterprise AP(if-wireless g)#vap 0
Enterprise AP(if-wireless g: VAP[0])#no 802.1X
6-65
Enterprise AP(if-wireless g: VAP[0])#wpa-pre-shared-key
passphrase-key agoodsecret
6-121
Enterprise AP(if-wireless g: VAP[0])#auth wpa-psk required
Data Encryption is set to Enabled.
WPA2 Clients Mode is set to Disabled.
WPA Clients Mode is set to Required.
WPA Multicast Cipher is set to TKIP.
WPA Unicast Cipher can accept TKIP only.
WPA Authentication is set to Pre-Shared Key.
Enterprise AP(if-wireless g: VAP[0])#
Enterprise AP(if-wireless g: VAP[0])#