Protocols And Standards; Configuring Wlan Security; Enabling An Authentication Method - H3C WA Series Configuration Manual

Table of Contents

Advertisement

1)
PSK authentication
Both WPA wireless access and WPA2 wireless access support PSK authentication. To implement PSK
authentication, the client and the authenticator must have the same shared key configured.
2)
802.1X authentication
As a port-based access control protocol, 802.1X authenticates and controls accessing devices at the
port level. A device connected to an 802.1X-enabled port of a WLAN access control device can access
the resources on the WLAN only after passing authentication.
3)
MAC authentication
MAC authentication provides a way for authenticating users based on ports and MAC addresses. For
this authentication, the user does not need to install any client software. When the device first detects
the MAC address of a user, it starts the authentication for the user. During the authentication process,
the user does not need to manually input username or password. In WLAN applications, MAC
authentication needs to get the MAC addresses of the clients in advance. Therefore, MAC
authentication is applicable to small-scaled networks with relatively fixed users, for example, SOHO
and small offices.

Protocols and Standards

IEEE Standard for Information technology— Telecommunications and information exchange
between systems— Local and metropolitan area networks— Specific requirements -2004
WI-FI Protected Access – Enhanced Security Implementation Based On IEEE P802.11i
Standard-Aug 2004
Information
systems—Local and metropolitan area networks—Specific requirements—802.11, 1999
IEEE Standard for Local and metropolitan area networks" Port-Based Network Access
Control"802.1X™- 2004

Configuring WLAN Security

To configure WLAN Security on a service template, map the service template to a radio. The SSID
name, advertisement setting (beaconing), and encryption settings are configured in the service
template. You can configure the SSID to support any combination of WPA, RSN, and non-WPA clients.

Enabling an Authentication Method

Configuring the PTK Lifetime
Configuring the GTK Rekey Method
Configuring Security IE
Configuring Cipher Suit
Configuring Port Security
Enabling an Authentication Method
You can enable both open system authentication and shared key authentication or either of them.
technology—Telecommunications
Task
and
information
Required
Optional
Optional
Required
Required
Optional
5-4
exchange
Description
between

Advertisement

Table of Contents
loading

Table of Contents