Enabling And Disabling Public Secure Packet Forwarding - Cisco 1941W Configuration Manual

Cisco 3900 series, cisco 2900 series, cisco 1900 series
Hide thumbs Also See for 1941W:
Table of Contents

Advertisement

Enabling and Disabling Public Secure Packet Forwarding

DETAILED STEPS
Command
Step 1
configure terminal
Step 2
interface dot11radio {0| 1}
Step 3
payload-encapsulation
{snap | dot1h}
Step 4
end
Step 5
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Enabling and Disabling Public Secure Packet Forwarding
Public Secure Packet Forwarding (PSPF) prevents client devices that are associated to an access point
from inadvertently sharing files or communicating with other client devices that are associated to the
access point. PSPF provides Internet access to client devices without providing other capabilities of a
LAN. This feature is useful for public wireless networks like those installed in airports or on college
campuses.
To prevent communication between clients associated to different access points, you must set up
Note
protected ports on the switch to which the wireless devices are connected. See the
Protected Ports" section on page 287
To enable and disable PSPF using command-line interface (CLI) commands on the wireless device, you
use bridge groups. You can find a detailed explanation of bridge groups and instructions for
implementing them in this document:
PSPF is disabled by default. To enable PSPF, follow these steps, beginning in privileged EXEC mode.
SUMMARY STEPS
1.
2.
3.
4.
5.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
286
Cisco IOS Bridging and IBM Networking Configuration Guide, Release 12.2. Click this link to
browse to the Configuring Transparent Bridging chapter:
http://www.cisco.com/en/US/docs/ios/12_2/ibm/configuration/guide/
bcftb_ps1835_TSD_Products_Configuration_Guide_Chapter.html
configure terminal
interface dot11radio {0| 1}
bridge-group group port-protected
end
copy running-config startup-config
Purpose
Enters global configuration mode.
Enters interface configuration mode for the radio interface. The
802.11g/n 2.4-GHz radio is radio 0.
The 802.11n 5-GHz radio is radio 1.
Sets the encapsulation transformation method to RFC 1042
(snap) or 802.1h (dot1h, the default setting).
Returns to privileged EXEC mode.
for instructions on setting up protected ports.
Chapter
Configuring Radio Settings
"Configuring

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

194129012911295139252921 ... Show all

Table of Contents