User Guide Part 2
Wi-Fi Array
Appendix D: Implementing PCI DSS 423
Compliance Configuration above to ensure that you are using the Array in
accordance with the PCI DSS requirements.
The pci-audit command checks items such as:
z
Telnet is disabled.
z
Admin RADIUS is enabled (admin login authentication is via RADIUS
server).
z
An external Syslog server is in use.
z
All SSIDs must set encryption to WPA or better (which also enforces
802.1x authentication)
Sample output from this command is shown below.
Figure 189. Sample output of pci-audit command
Additional Resources
z
PCI Security Standards Web site: www.pcisecuritystandards.org
z
List of Qualified PCI Security Assessors: www.pcisecuritystandards.org/
pdfs/pci_qsa_list.pdf
z
For the latest version of the Xirrus White Paper, PCI Data Security
Standard, and the latest versions of Xirrus software, please check
www.xirrus.com
SS-Array(config)# pci-audit
PCI audit failure: telnet enabled.
PCI audit failure: admin RADIUS authentication disabled.
PCI audit failure: SSID ssid2 encryption too weak.
PCI audit failure: SSID ssid3 encryption too weak.
PCI audit failure: SSID ssid4 encryption too weak.
PCI audit failure: SSID ssid5 encryption too weak.
PCI audit failure: SSID ssid6 encryption too weak.