HP a-msr Configuration Manual page 4

Wlan
Table of Contents

Advertisement

Configuring security IE ·········································································································································· 33
Configuring cipher suite ······································································································································· 34
Configuring port security ······································································································································ 35
Displaying and maintaining WLAN security ······································································································ 37
WLAN security configuration examples ······················································································································ 37
PSK authentication configuration example ········································································································· 37
MAC and PSK authentication configuration example ······················································································· 38
802.1X authentication configuration example ·································································································· 41
Supported combinations for ciphers ···························································································································· 46
WLAN IDS configuration ·············································································································································· 49
Terminology ··························································································································································· 49
WIDS attack detection ·········································································································································· 49
WLAN IDS configuration task list ································································································································· 50
Configuring IDS attack detection ································································································································· 50
Displaying and maintaining IDS attack detection ······························································································ 51
WLAN IDS frame filtering configuration ····················································································································· 52
Blacklist and white list ··········································································································································· 52
Configuring WLAN IDS frame filtering ························································································································ 53
Displaying and maintaining WLAN IDS frame filtering ···························································································· 54
WLAN IDS frame filtering configuration example ······································································································ 54
WLAN QoS configuration ············································································································································ 55
Terminology ··························································································································································· 55
WMM protocol overview ····································································································································· 55
Protocols and standards ······································································································································· 57
WMM configuration ······················································································································································ 57
Displaying and maintaining WMM ····························································································································· 59
WMM configuration examples ···································································································································· 59
WMM basic configuration ··································································································································· 59
CAC service configuration example ··················································································································· 60
SVP service configuration example ····················································································································· 62
Troubleshooting ······························································································································································ 63
EDCA parameter configuration failure ··············································································································· 63
SVP or CAC configuration failure························································································································ 63
Support and other resources ········································································································································ 64
Contacting HP ································································································································································ 64
Subscription service ·············································································································································· 64
Related information ························································································································································ 64
Documents ······························································································································································ 64
Websites ································································································································································ 64
Conventions ···································································································································································· 65
Index ················································································································································································ 67
iv

Advertisement

Table of Contents
loading

Table of Contents