User's Manual
Table Of Contents
- Chapter 1: Introduction 1-1
- Chapter 1: Introduction
- Chapter 2: Hardware Installation
- Chapter 3: Network Configuration
- Chapter 4: Initial Configuration
- Chapter 5: System Configuration
- Chapter 6: Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- snmp-server community
- snmp-server contact
- snmp-server location
- snmp-server enable server
- snmp-server host
- snmp-server trap
- snmp-server engine-id
- snmp-server user
- snmp-server targets
- snmp-server filter
- snmp-server filter-assignments
- show snmp groups
- show snmp users
- show snmp group-assignments
- show snmp target
- show snmp filter
- show snmp filter-assignments
- show snmp
- Flash/File Commands
- RADIUS Client
- 802.1X Authentication
- MAC Address Authentication
- Filtering Commands
- WDS Bridge Commands
- Spanning Tree Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- interface wireless
- vap
- speed
- multicast-data-rate
- channel
- transmit-power
- radio-mode
- preamble
- antenna control
- antenna id
- antenna location
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- super-g
- description
- ssid
- closed-system
- max-association
- assoc-timeout-interval
- auth-timeout-value
- shutdown
- show interface wireless
- show station
- Rogue AP Detection Commands
- Wireless Security Commands
- Link Integrity Commands
- IAPP Commands
- VLAN Commands
- WMM Commands
- Appendix A: Troubleshooting
- Appendix B: Cables and Pinouts
- Appendix C: Specifications
- Glossary
- Index
Command Line Interface
6-114
6
Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the 802.11g interface.
auth
This command defines the 802.11 authentication type allowed by the VAP interface.
Syntax
auth <open-system | shared-key | wpa | wpa-psk | wpa2 | wpa2-psk |
wpa-wpa2-mixed | wpa-wpa2-psk-mixed | > <required | supported>
• open-system - Accepts the client without verifying its identity using a
shared key. “Open” authentication means either there is no encryption (if
encryption is disabled) or WEP-only encryption is used (if encryption is
enabled).
• shared-key - Authentication is based on a shared key that has been
distributed to all stations. If encryption is enabled, “shared” authentication
uses WEP-only encryption.
• wpa - Clients using WPA are accepted for authentication.
• wpa-psk - Clients using WPA with a Pre-shared Key are accepted for
authentication.
• wpa2 - Clients using WPA2 are accepted for authentication.
Table 6-19. Wireless Security Commands
Command Function Mode Page
auth Defines the 802.11 authentication type allowed by the
access point
IC-W-VAP 6-117
encryption Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-VAP 6-116
key Sets the keys used for WEP encryption IC-W 6-117
transmit-key Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-VAP 6-118
cipher-suite Selects an encryption method for the global key used
for multicast and broadcast traffic
IC-W-VAP 6-119
mic_mode Specifies how to calculate the Message Integrity
Check (MIC)
IC-W 6-120
wpa-pre-shared- key Defines a WPA preshared-key value IC-W-VAP 6-121
pmksa-lifetime Sets the lifetime PMK security associations IC-W-VAP 6-121
pre-authentication Enables WPA2 pre-authentication for fast roaming IC-W-VAP 6-122