Configuring an ISP domain ································································································································ 194
AAA configuration example ······································································································································· 200
RADIUS configuration ············································································································································· 204
RADIUS overview ························································································································································· 204
Configuring a RADIUS scheme ··································································································································· 204
RADIUS configuration examples································································································································· 210
Configuration guidelines ············································································································································· 217
HWTACACS configuration ···································································································································· 219
HWTACACS overview ················································································································································ 219
Configuring HWTACACS ··········································································································································· 219
Configuring HWTACACS servers ····················································································································· 220
HWTACACS configuration example ························································································································· 224
Configuration guidelines ············································································································································· 229
User configuration ··················································································································································· 231
User overview ······························································································································································· 231
Configuring a local user ·············································································································································· 231
Configuring a user group ············································································································································ 234
Configuring a guest ····················································································································································· 235
Certificate management ········································································································································· 238
PKI overview ································································································································································· 238
Configuring PKI ···························································································································································· 238
Creating a PKI entity ··········································································································································· 241
Creating a PKI domain ······································································································································· 242
Generating an RSA key pair ······························································································································ 245
Destroying the RSA key pair ······························································································································ 246
Requesting a local certificate ····························································································································· 247
Retrieving and displaying a CRL ························································································································ 248
PKI configuration example ·········································································································································· 249
Configuration guidelines ············································································································································· 254
Wireless service ······················································································································································ 255
Access service ······························································································································································ 255
Terminology ························································································································································· 255
Wireless client access ········································································································································· 255
WLAN data security ··········································································································································· 259
Client access authentication ······························································································································· 260
802.11n ······························································································································································· 262
Introduction to WDS ···················································································································································· 262
Advantages of WDS ··········································································································································· 262
WDS network topologies ··································································································································· 262
Repeater mode overview ············································································································································· 264
v