Specifications
xxiii
Clearing Security ACLs from the Edit Buffer .........................................................................................15-19
Example..........................................................................................................................................15-19
Using ACLs to Change CoS ........................................................................................................................15-20
Example ................................................................................................................................................15-20
Filtering Based on DSCP Values ..........................................................................................................15-21
Using the dscp Option ....................................................................................................................15-21
Example ...................................................................................................................................15-21
Using the precedence and ToS Options.........................................................................................15-22
Example ...................................................................................................................................15-22
Enabling Prioritization for Legacy Voice over IP..........................................................................................15-23
General Guidelines ...............................................................................................................................15-23
Enabling VoIP Support for TeleSym VoIP.............................................................................................15-24
Enabling SVP Optimization for SpectraLink Phones.............................................................................15-24
Known Limitations ..........................................................................................................................15-25
Configuring a Service Profile for RSN (WPA2)...............................................................................15-25
Example ...................................................................................................................................15-25
Configuring a Service Profile for WPA............................................................................................15-26
Example ...................................................................................................................................15-26
Configuring a Radio Profile.............................................................................................................15-26
Example ...................................................................................................................................15-26
Configuring a VLAN and AAA for Voice Clients ............................................................................. 15-27
Example ...................................................................................................................................15-27
Configuring an ACL to Prioritize Voice Traffic ................................................................................15-27
Example ...................................................................................................................................15-28
Setting 802.11b/g Radios to 802.11b (for Siemens SpectraLink VoIP Phones only) .....................15-28
Disabling RF Auto-Tuning Before Upgrading a SpectraLink Phone...............................................15-28
Example ...................................................................................................................................15-28
Restricting Client-To-Client Forwarding Among IP-Only Clients .................................................................15-28
Security ACL Configuration Scenario .......................................................................................................... 15-29
Chapter 16: Managing Keys and Certificates
Why Use Keys and Certificates? ...................................................................................................................16-1
Wireless Security through TLS................................................................................................................ 16-2
PEAP-MS-CHAP-V2 Security .................................................................................................................16-2
About Keys and Certificates ..........................................................................................................................16-2
Public Key Infrastructures .......................................................................................................................16-3
Public and Private Keys ..........................................................................................................................16-3
Digital Certificates ...................................................................................................................................16-3
PKCS #7, PKCS #10, and PKCS #12 Object Files.................................................................................16-4
Certificates Automatically Generated by MSS...............................................................................................16-5
Creating Keys and Certificates ......................................................................................................................16-5
Choosing the Appropriate Certificate Installation Method for Your Network ...........................................16-6
Creating Public-Private Key Pairs...........................................................................................................16-7
Example............................................................................................................................................ 16-7
Generating Self-Signed Certificates........................................................................................................16-7
Example............................................................................................................................................ 16-7
Installing a Key Pair and Certificate from a PKCS #12 Object File .........................................................16-8
Creating a CSR and Installing a Certificate from a PKCS #7 Object File ...............................................16-9
Installing a CA’s Own Certificate...........................................................................................................16-10
Displaying Certificate and Key Information..................................................................................................16-11
Example ................................................................................................................................................16-11
Key and Certificate Configuration Scenarios...............................................................................................16-11
Creating Self-Signed Certificates.......................................................................................................... 16-11