Overview
This chapter describes how to:
Configure wireless security
■
Configure encryption
■
■
Configure key management
■
Configure MAC and 802.1X authentication
Configure MAC Lockout and Client/Station Deauthentication
■
■
Configure AP Authentication
■
Configure Web Authentication
Wireless Security Configuration
Overview
7-5