Usage Guidelines - Extreme Networks ExtremeWare Command Reference Manual

Version 7.5
Hide thumbs Also See for ExtremeWare:
Table of Contents

Advertisement

Usage Guidelines

The following table lists the valid combinations of authentication and encryption:
Dot11 Authentication
open
open
open
open
open
open
open
open
shared
shared
shared
ExtremeWare 7.5 Command Reference Guide
Network Authentication
none
web-based
mac-radius
dot1x
wpa
wpa-psk
wpa2
wpa2-psk
none
web-based
mac-radius
configure security-profile dot11-auth network-auth encryption
Encryption
Choices:
none
wep64
wep128
Choices:
none
wep64
wep128
Choices:
none
wep64
wep128
Choices:
wep64
wep128
Choices:
tkip
aes
aes-tkip
Choices:
tkip
aes
aes-tkip
Choices:
aes
Choices:
aes
Choices:
wep64
wep128
Choices:
wep64
wep128
Choices:
wep64
wep128
893

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware 7.5

Table of Contents