Dell W-Series 207 Instant 6.4.3.1-4.2 User Guide - Page 110

In the CLI

Page 110 highlights

Table 22: Configuration Parameters for WLAN Security Settings in an Employee or Voice Network Parameter Description Security Level Type Uppercase support Set to Enabled to allow the W-IAP to use uppercase letters in MAC address string for MAC authentication. NOTE: This option is available only if MAC authentication is enabled. Enterprise , Personal, and Open security levels. Upload Certificate Click Upload Certificate and browse to upload a certificate file for the internal server. For more information on certificates, see Uploading Certificates on page 186. Enterprise , Personal, and Open security levels Fast Roaming You can configure the following fast roaming options for the WLAN SSID: l Opportunistic Key Caching: You can enable Opportunistic Key Caching (OKC) when WPA-2 Enterprise and Both (WPA2-WPA) encryption types are selected. If OKC is enabled, a cached pairwise master key (PMK) is used when the client roams to a new AP. This allows faster roaming of clients without the need for a complete 802.1X authentication. l 802.11r: Selecting this checkbox enables fast BSS transition. The Fast BSS Transition mechanism minimizes the delay when a client transitions from one BSS to another within the same cluster. This option is available only when WPA-2 enterprise and WPA2-personal encryption keys are selected. l 802.11k: Selecting this checkbox enables 802.11k roaming on the SSID profile. The 802.11k protocol enables W-IAPs and clients to dynamically measure the available radio resources. When 802.11k is enabled, W-IAPs and clients send neighbor reports, beacon reports, and link measurement reports to each other. l 802.11v: Selecting this checkbox enables 802.11v based BSS transition. 802.11v standard defines mechanisms for wireless network management enhancements and BSS transition management. It allows client devices to exchange information about the network topology and RF environment. The BSS transition management mechanism enables an AP to request a voice client to transition to a specific AP, or suggest a set of preferred APs to a voice client, due to network load balancing or BSS termination. It also helps the voice client identify the best AP to transition to as they roam. Enterprise , Personal, and Open security levels. 4. Click Next to configure access rules. For more information, see Configuring Access Rules for a WLAN SSID Profile on page 111. In the CLI To configure enterprise security settings for the employee and voice users: (Instant AP)(config)# wlan ssid-profile (Instant AP)(SSID Profile )# opmode {wpa2-aes|wpa-tkip,wpa2-aes|dynamic-wep} (Instant AP)(SSID Profile )# leap-use-session-key (Instant AP)(SSID Profile )# termination (Instant AP)(SSID Profile )# auth-server (Instant AP)(SSID Profile )# external-server (Instant AP)(SSID Profile )# server-load-balancing (Instant AP)(SSID Profile )# blacklist 110 | Wireless Network Profiles Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403

110
| Wireless Network Profiles
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
Parameter
Description
Security
Level
Type
Uppercase
support
Set to
Enabled
to allow the W-IAP to use uppercase letters in MAC address string
for MAC authentication.
NOTE:
This option is available only if MAC authentication is enabled.
Enterprise
,
Personal
,
and
Open
security
levels.
Upload
Certificate
Click
Upload Certificate
and browse to upload a certificate file for the internal
server. For more information on certificates, see
Uploading Certificates on page
186
.
Enterprise
,
Personal
,
and
Open
security
levels
Fast Roaming
You can configure the following fast roaming options for the WLAN SSID:
l
Opportunistic Key Caching
: You can enable
Opportunistic Key Caching
(OKC) when
WPA-2 Enterprise
and
Both (WPA2-WPA)
encryption types are
selected. If OKC is enabled, a cached pairwise master key (PMK) is used when
the client roams to a new AP. This allows faster roaming of clients without the
need for a complete 802.1X authentication.
l
802.11r
: Selecting this checkbox enables fast BSS transition. The Fast BSS
Transition mechanism minimizes the delay when a client transitions from one
BSS to another within the same cluster. This option is available only when WPA-2
enterprise and WPA2-personal encryption keys are selected.
l
802.11k
: Selecting this checkbox enables 802.11k roaming on the SSID profile.
The 802.11k protocol enables W-IAPs and clients to dynamically measure the
available radio resources. When 802.11k is enabled, W-IAPs and clients send
neighbor reports, beacon reports, and link measurement reports to each other.
l
802.11v
: Selecting this checkbox enables 802.11v based BSS transition. 802.11v
standard defines mechanisms for wireless network management enhancements
and BSS transition management. It allows client devices to exchange information
about the network topology and RF environment. The BSS transition
management mechanism enables an AP to request a voice client to transition to
a specific AP, or suggest a set of preferred APs to a voice client, due to network
load balancing or BSS termination. It also helps the voice client identify the best
AP to transition to as they roam.
Enterprise
,
Personal
,
and
Open
security
levels.
Table 22:
Configuration Parameters for WLAN Security Settings in an Employee or Voice Network
4. Click
Next
to configure access rules. For more information, see
Configuring Access Rules for a WLAN SSID
Profile on page 111
.
In the CLI
To configure enterprise security settings for the employee and voice users:
(Instant AP)(config)# wlan ssid-profile <name>
(Instant AP)(SSID Profile <name>)# opmode {wpa2-aes|wpa-tkip,wpa2-aes|dynamic-wep}
(Instant AP)(SSID Profile <name>)# leap-use-session-key
(Instant AP)(SSID Profile <name>)# termination
(Instant AP)(SSID Profile <name>)# auth-server <server-name>
(Instant AP)(SSID Profile <name>)# external-server
(Instant AP)(SSID Profile <name>)# server-load-balancing
(Instant AP)(SSID Profile <name>)# blacklist