Zyxel USG 1900 [75/438] Security profile commands

Zyxel USG 1900 [75/438] Security profile commands
Chapter 8 Wireless LAN Profiles
ZyWALL / USG (ZLD) CLI Reference Guide
75
8.5 Security Profile Commands
The following table identifies the values required for many of these commands. Other input values
are discussed with the corresponding commands.
The following table describes the commands available for security profile management. You must
use the
configure terminal command to enter the configuration mode before you can use
these commands.
Table 19 Input Values for General Security Profile Commands
LABEL DESCRIPTION
security_profile_name The security profile name. You may use 1-31 alphanumeric characters,
underscores (
_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
wep_key Sets the WEP key encryption strength. Select either 64bit or 128bit.
wpa_key Sets the WPA/WPA2 pre-shared key in ASCII. You may use 8~63 alphanumeric
characters. This value is case-sensitive.
wpa_key_64 Sets the WPA/WPA2 pre-shared key in HEX. You muse use 64 alphanumeric
characters.
secret Sets the shared secret used by your network’s RADIUS server.
auth_method The authentication method used by the security profile.
Table 20 Command Summary: Security Profile
COMMAND DESCRIPTION
show wlan-security-profile {all |
security_profile_name}
Displays the security profile(s).
all: Displays all profiles for the selected operating mode.
security_profile_name: Displays the specified profile for the
selected operating mode.
wlan-security-profile rename
security_profile_name1 security_profile_name2
Gives existing security profile (security_profile_name1) a new
name, (security_profile_name2).
[no] wlan-security-profile
security_profile_name
Enters configuration mode for the specified security profile. Use
the no parameter to remove the specified profile.
[no] dot11w Data frames in 802.11 WLANs can be encrypted and authenticated
with WEP, WPA or WPA2. But 802.11 management frames, such
as beacon/probe response, association request, association
response, de-authentication and disassociation are always
unauthenticated and unencrypted. IEEE 802.11w Protected
Management Frames allows APs to use the existing security
mechanisms (encryption and authentication methods defined in
IEEE 802.11i WPA/WPA2) to protect management frames. This
helps prevent wireless DoS attacks.
Enables management frame protection (MFP) to add security to
802.11 management frames. Use the no parameter to disable it.
dot11w-op <1..2> Sets whether wireless clients have to support management frame
protection in order to access the wireless network.
1: if you do not require the wireless clients to support MFP.
Management frames will be encrypted if the clients support MFP.
2: wireless clients must support MFP in order to join the AP’s
wireless network.
mode {none | wep | wpa | wpa2 | wpa2-mix} Sets the security mode for this profile.

Содержание

Похожие устройства

Скачать