Configuring Ssh; Managing Aironet Extensions - Cisco C3201FESMIC-TP= - 3201 Fast EN Switch Mobile Interface Card Expansion Module Software Configuration Manual

Wireless mic
Table of Contents

Advertisement

Managing Aironet Extensions

For more information about SSH, see the "Configuring Secure Shell" section in the Cisco IOS Security
Configuration Guide for Release 12.2.
The SSH feature in Cisco IOS release 12.3(8)JK does not support IP Security (IPSec).
Note

Configuring SSH

Before you configure SSH, download the crypto software image from Cisco.com. For information about
configuring SSH and displaying SSH settings, see the "Configuring Secure Shell" section in the Cisco
IOS Security Configuration Guide for Release 12.2.
Managing Aironet Extensions
The WMIC uses Cisco Aironet 802.11 extensions to detect the capabilities of Cisco client devices and
to support features that require specific interaction between the WMIC and associated client devices.
The Aironet extensions can be deactivated only in the root access point mode. Since workgroup bridge,
root device, and non-root bridge are Cisco-specific modes, they always use the Aironet extensions.
Aironet extensions must be enabled to support the following features:
To disable the Aironet extensions, follow these steps, beginning in privileged EXEC mode:
Command
Step 1
configure terminal
Step 2
interface dot11radio 0
Step 3
station-role root ap-only
Step 4
no dot11 extension aironet
Step 5
end
Step 6
copy running-config startup-config (Optional) Saves your entries in the configuration file.
If you change the radio to a role that requires Aironet extensions, the Aironet extensions are enabled
automatically:
wmic1(config)#int dot 0
Cisco 3200 Series Wireless MIC Software Configuration Guide
40
Load balancing—The WMIC uses Aironet extensions to direct client devices to an access point that
provides the best connection to the network, based on such factors as number of users, bit error rates,
and signal strength.
Message Integrity Check (MIC)—MIC is an additional WEP security feature that prevents attacks
on encrypted packets called bit-flip attacks. The MIC, implemented on both the WMIC and all
associated client devices, adds a few bytes to each packet to make the packets tamper-proof.
Temporal Key Integrity Protocol (TKIP)—TKIP, also known as WEP key hashing, is an additional
WEP security feature that defends against an attack on WEP in which the intruder uses an
unencrypted segment called the initialization vector (IV) in encrypted packets to calculate the WEP
key.
Limiting the power level on associated client devices—When a client device associates to the
WMIC, the WMIC sends the maximum allowed power level setting to the client.
Purpose
Enters global configuration mode.
Enters interface configuration mode for the radio interface.
Enters the station role. Root enables the access point mode.
Enters the extension aironet command to disable extensions.
Returns to privileged EXEC mode.
Administering the WMIC

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents