Overview ································································································································ 33
Authentication modes ········································································································· 33
WLAN data security ··········································································································· 34
Protocols and standards ····································································································· 35
Configuring WLAN security ········································································································ 36
Configuration task list ········································································································· 36
Configuring security IE ······································································································· 38
Configuring cipher suite ······································································································ 38
Configuring port security ····································································································· 40
Overview ································································································································ 55
Terminology ····················································································································· 55
Attack detection ················································································································ 55
Blacklist and white list ········································································································ 56
Configuring attack detection ································································································ 58
Configuring static lists ········································································································ 59
Overview ································································································································ 62
Terminology ····················································································································· 62
WMM protocol ·················································································································· 62
Protocols and standards ····································································································· 64
Configuring WMM ···················································································································· 64
Configuration procedure ····································································································· 65
Troubleshooting ················································································································ 69
Configuration procedure ····································································································· 70
Index ··························································································· 73
ii