Example Wireless Configuration Processes; Wireless Management Configuration Example - Extreme Networks Summit 300-48 Software User's Manual

Extreme summit 300-48: software user guide
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

Table 54: Commands to Create Certificates and Private Key (continued)
Command
show ssl
show ssl detail
configure ssl certificate
pregenerated
configure ssl privkey
pregenerated

Example Wireless Configuration Processes

This section provides examples of configuration processes. In the first example, the wireless
management VLAN is configured, IP addresses are assigned, and RF profiles are created and
configured. Next, security profile examples are given for a variety of security options. Finally, example
steps are provided for assigning profiles to ports.
NOTE
The commands provided in each step are examples.

Wireless Management Configuration Example

Refer to the following example when configuring VLAN, IP addresses, and RF profiles.
NOTE
Any addition, deletion or movement of wireless ports from vlan to vlan must be preceded by disabling
the wireless port(s).
Configure the VLAN, Wireless Port IP Addresses and RF-profiles:
1 Create a vlan to be use as the wireless management VLAN.
create vlan manage-wireless
Summit 300-48 Switch Software User Guide
Description
Displays the following information:
HTTPS port configured. This is the port on which the clients will connect.
Result of a check to see whether the private key matches with the public
key stored in the certificate.
Length of RSA key (number of bits used to generate the private key)
Basic information about the stored certificate.
Provides the same output as the show ssl command, plus the complete
certificate. Private key (in PEM format) will be displayed for users with
administration privileges.
Obtains the pre-generated certificate from the user. This command is also
used when downloading/ uploading the configuration. The certificate
information stored in the uploaded configuration file should not be modified,
because it is signed using the issuer's private key.
The certificate and private key file should be in PEM format and generated
using RSA as the cryptography algorithm.
Obtains the pregenerated private key from the user. This command will also
be used when downloading/uploading the configuration. The private key will be
stored in the uploaded configuration file in an encrypted format using a hard
coded passphrase. Hence the private key information in the configuration file
should not be modified.
The certificate and private key file should be in PEM format and generated
using RSA as the cryptography algorithm.

Example Wireless Configuration Processes

115

Advertisement

Table of Contents
loading

Table of Contents