Example Wireless Configuration Process - Extreme Networks Summit 300-48 Software User's Manual

Software version 6.2a
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

Table 34: Security Profile Command Property Values (continued)
Case
dot1x multicast-cipher <value>
dot1x auth-suite dot1x
dot1x auth-suite psk pre-shared-key
<value> <string> vlan <vlan name>
dot1x group-update-timer <integer>
dot1x pairwise-update-timer <integer> 1
dot1x reauth-period <integer>

Example Wireless Configuration Process

This section provides an example of the configuration process. First, the wireless management VLAN is
configured, IP addresses are assigned, and RF profiles are created and configured. Next, the security
profile is created, with examples given for WEP and dot1x security. Finally, example steps are provided
for assigning profiles to ports.
NOTE
The commands provided in each step are examples.
Summit 300-48 Switch Software User Guide
Default Ranges
wep
aes | tkip | wep
hex | plaintext |
passphrase
1
1-1440
1-1440
3600
60-60,000
Example Wireless Configuration Process
Action
Specifies the cipher suite to use for
legacy 802.1x or WPA clients. If the
mcast cipher suite is aes, then the
unicast cipher suite is AES. If the mcast
cipher suite is tkip or wep, the unicast
cipher suite is TKIP. Specifying this has
no effect if non-WPA clients are used. If
non-WPA clients are used, then WEP
encryption is used for both unicast and
broadcast. The key length for non-WPA
clients is specified using the
encryption-length property above.
Also, if both WPA and non-WPA clients
are on the same VLAN, then the packet
is broadcast twice (once with each
encryption key).
Sets the authentication suite to be dot1x,
which means that keys are dynamically
generated. Keys are not pushed from the
RADIUS server, but are generated on the
access point. This is valid only for WPA
clients.
Specifies pre-shared keys to be the
authentication-suite for dot1x. The key
can be specified as a hex key or
passphrase or plaintext. Plaintext keys
are converted to hex keys by using the
ASCII values of the various characters in
the key. The length of the key must 32
bytes (64 hex digits, or 32 characters
when using plaintext keys). For
passphrases, the key must be at least 8
characters long. All clients authenticated
using this policy are placed into the
specified VLAN.
Specifies the time used to re-key the
broadcast key (in minutes).
Specifies the time interval at which
session keys are refreshed (in minutes).
Specifies the time interval (in seconds) at
which the clients will need to
re-authenticate.
91

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Summit 300-48 and is the answer not in the manual?

Questions and answers

Table of Contents