Motorola WS5100 Series Reference Manual page 439

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

B.4.4. Sample Switch Configuration File for IPSec and Independent
WLAN
The following constitutes a sample WS5100 switch configuration file supporting an AAP IPSec with
Independent WLAN configuration. Please note new AAP specific CLI commands in
comments in blue.
The sample output is as follows:
!
! configuration of WS5100
!
version 1.0
!
!
aaa authentication login default none
service prompt crash-info
!
hostname WS5100-1
!
username admin password 1 8e67bb26b358e2ed20fe552ed6fb832f397a507d
username admin privilege superuser
username operator password 1 fe96dd39756ac41b74283a9292652d366d73931f
!
!
To configure the ACL to be used in the CRYPTO MAP
!
ip access-list extended AAP-ACL permit ip host 10.10.10.250 any rule-precedence 20
!
spanning-tree mst cisco-interoperability enable
spanning-tree mst config
name My Name
!
country-code us
logging buffered 4
logging console 7
logging host 157.235.92.97
logging syslog 7
snmp-server sysname WS5100-1
snmp-server manager v2
snmp-server manager v3
snmp-server user snmptrap v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpmanager v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b
snmp-server user snmpoperator v3 encrypted auth md5 0x49c451c7c6893ffcede0491bbd0a12c4
!
To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all AAPs. 12345678 is the
default passkey. If you change on the AAP, change here as well.
!
crypto isakmp key 0 12345678 address 255.255.255.255
Appendix B: Adaptive AP B - 17
red
and relevant

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents