Technical data

© 2012 Meru Networks, Inc. Contents xi
Chapter 7
Configuring Network Interfaces . . . . . . . . . . . . . . .109
Configuring Basic Networking for the Interface . . . . . . . . . . . 109
802.11d Support . . . . . . . . . . . . . . . . . . . . 110
Dual-Ethernet Operation. . . . . . . . . . . . . . . . . . . 110
Configuring Dual Ethernet . . . . . . . . . . . . . . . . . 110
Configuring a Redundant Interface . . . . . . . . . . . . . 111
Configuring an Active Interface . . . . . . . . . . . . . . 111
Viewing FastEthernet Interface Information . . . . . . . . . . . 111
Interface and Networking Commands . . . . . . . . . . . . . 112
Chapter 8
Configuring Security . . . . . . . . . . . . . . . . . . . .113
Configuring Wireless LAN Security . . . . . . . . . . . . . . . 113
Configure a Security Profile With the Web UI . . . . . . . . . . . 114
Wi-Fi Protected Access (WPA and WPA2) . . . . . . . . . . . . 117
Encryption Support . . . . . . . . . . . . . . . . . . . . 119
CCMP-AES. . . . . . . . . . . . . . . . . . . . . . . 119
TKIP . . . . . . . . . . . . . . . . . . . . . . . . 119
WEP Security Features . . . . . . . . . . . . . . . . . . 119
Operation of the WEP Protocol . . . . . . . . . . . . . . 120
Limitations of the WEP Protocol. . . . . . . . . . . . . . 121
Configure GRE Tunnels . . . . . . . . . . . . . . . . . . . 121
Configure a Security Profile With the CLI . . . . . . . . . . . . . 124
Configure 802.1X Radius Security With the CLI . . . . . . . . . . 125
Example Security Profile with 802.1X Radius . . . . . . . . . 125
802.1X PTK Rekey. . . . . . . . . . . . . . . . . . . 126
802.1X GTK Rekey . . . . . . . . . . . . . . . . . . 126
Configure WPA2 With the CLI . . . . . . . . . . . . . . . . 128
Example WPA2 Configuration . . . . . . . . . . . . . . . 128
Example WPA2-PSK Configuration . . . . . . . . . . . . . 129
Configure WPA With the CLI . . . . . . . . . . . . . . . . 129
Example CLI WPA Configuration . . . . . . . . . . . . . . 129
Opportunistic PMK Caching for WPA . . . . . . . . . . . . 130
WPA PTK Rekey . . . . . . . . . . . . . . . . . . . 130
WPA GTK Rekey . . . . . . . . . . . . . . . . . . . 131
Example WPA-PSK Configuration . . . . . . . . . . . . . 131
WPA/WPA-PSK Command Summary. . . . . . . . . . . . . 131
Configure 802.11 WEP Encryption . . . . . . . . . . . . . . 132
Checking a CLI Configuration . . . . . . . . . . . . . . . . 133
Policy Enforcement Module . . . . . . . . . . . . . . . . . . 135
Configure Firewall Policies with the CLI . . . . . . . . . . . . 135
Troubleshooting Per-User Firewall . . . . . . . . . . . . . . 136
Proactive Spectrum Manager . . . . . . . . . . . . . . . . . 137
Configure Proactive Dashboard Manager Using the Web UI . . . . . . 137
Configure Proactive Dashboard Manager Using the CLI . . . . . . . 138
RSA SecurID Authentication. . . . . . . . . . . . . . . . . . 138
RSA SecurID Authenticator Token and Code . . . . . . . . . . . 139
RSA SecurID Server . . . . . . . . . . . . . . . . . . . 139
RSA SecurID Agent. . . . . . . . . . . . . . . . . . . . 139