Sample Switch Configuration File For Ipsec And Independent Wlan - Brocade Communications Systems RFS6000 System Reference Manual

Provides centralized wireless lan (wlan)
Hide thumbs Also See for RFS6000:
Table of Contents

Advertisement

A

Sample Switch Configuration File for IPSec and Independent WLAN

The following constitutes a sample switch configuration file supporting an AAP IPSec with
Independent WLAN configuration. Please note new AAP specific CLI commands in
red
and relevant
comments in blue.
The sample output is as follows:
!
! configuration of Brocade Mobility RFS6000
!
version 1.0
!
!
aaa authentication login default none
service prompt crash-info
!
hostname Brocade Mobility RFS6000-1
!
username admin password 1 8e67bb26b358e2ed20fe552ed6fb832f397a507d
username admin privilege superuser
username operator password 1 fe96dd39756ac41b74283a9292652d366d73931f
!
!
To configure the ACL to be used in the CRYPTO MAP
!
ip access-list extended AAP-ACL permit ip host 10.10.10.250 any rule-precedence 20
!
spanning-tree mst cisco-interoperability enable
spanning-tree mst config
name My Name
!
country-code us
logging buffered 4
logging console 7
logging host 157.235.92.97
logging syslog 7
snmp-server sysname Brocade Mobility RFS6000-1
snmp-server manager v2
snmp-server manager v3
snmp-server user snmptrap v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpmanager v3 encrypted auth md5
0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpoperator v3 encrypted auth md5
0x49c451c7c6893ffcede0491bbd0a12c4
!
To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all AAPs. 12345678
is the default passkey. If you change on the AAP, change here as well.
!
crypto isakmp key 0 12345678 address 255.255.255.255
!
ip http server
ip http secure-trustpoint default-trustpoint
522
Brocade Mobility RFS4000, RFS6000, and RFS7000 System Reference Guide
53-1002515-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs4000Rfs7000

Table of Contents