Configuring WLANs
Click Apply to commit your changes.
Step 5
Click Save Configuration to save your changes.
Step 6
Using the CLI to Configure Peer-to-Peer Blocking
Follow these steps to configure a WLAN for peer-to-peer blocking using the CLI.
To configure a WLAN for peer-to-peer blocking, enter this command:
Step 1
config wlan peer-blocking {disable | drop | forward-upstream} wlan_id
Note
To save your changes, enter this command:
Step 2
save config
Step 3
To see the status of peer-to-peer blocking for a WLAN, enter this command:
show wlan wlan_id
Information similar to the following appears:
WLAN Identifier.................................. 1
Profile Name..................................... test
Network Name (SSID).............................. test
Status........................................... Enabled
...
...
...
Peer-to-Peer Blocking Action..................... Disabled
Radio Policy..................................... All
Local EAP Authentication...................... Disabled
Configuring Layer 2 Security
This section explains how to assign Layer 2 security settings to WLANs.
Note
Clients using the Microsoft Wireless Configuration Manager and 802.1X must use WLANs configured
for 40- or 104-bit key length. Configuring for 128-bit key length results in clients that can associate but
not authenticate.
Cisco Wireless LAN Controller Configuration Guide
6-20
See the description of each parameter in the
Blocking"
section above.
Chapter 6
Configuring WLANsWireless Device Access
"Using the GUI to Configure Peer-to-Peer
OL-17037-01