Motorola RFS Series Reference Manual page 486

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

B-16 Motorola RF Switch System Reference Guide
B.4.4 Sample Switch Configuration File for IPSec and Independent WLAN
The following constitutes a sample switch configuration file supporting an AAP IPSec with Independent
WLAN configuration. Please note new AAP specific CLI commands in
red
and relevant comments in blue.
The sample output is as follows:
!
! configuration of RFS6000
!
!
aaa authentication login default none
service prompt crash-info
!
hostname RFS6000-1
!
username admin password 1 8e67bb26b358e2ed20fe552ed6fb832f397a507d
username admin privilege
superuser
username operator password 1 fe96dd39756ac41b74283a9292652d366d73931f
!
!
To configure the ACL to be used in the CRYPTO MAP
!
ip access-list extended AAP-ACL permit ip host 10.10.10.250 any rule-precedence
20
!
spanning-tree mst cisco-interoperability enable
spanning-tree mst config
name My Name
!
country-code us
logging buffered 4
logging console 7
logging host 157.235.92.97
logging syslog 7
snmp-server sysname RFS6000-1
snmp-server manager v2
snmp-server manager v3
snmp-server user snmptrap v3 encrypted auth md5
0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpmanager v3 encrypted auth md5
0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpoperator v3 encrypted auth md5
0x49c451c7c6893ffcede0491bbd0a12c4
!
To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all
AAPs. 12345678 is the default passkey. If you change on the AAP, change here as
well.
!
crypto isakmp key 0 12345678 address 255.255.255.255
!
ip http server
ip http secure-trustpoint default-trustpoint
ip http secure-server
ip ssh
no service pm sys-restart
timezone America/Los_Angeles
license AP
xyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxyxy

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ws5100 3.3Rfs6000 3.3Rfs7000 1.3

Table of Contents