User's Manual

Table Of Contents
Example 4.23. WPA2 EAP-TTLS+MD5 station (CPE)
EION: interface Wireless 1 type station
Interface 'Wireless 1': type 'station'.
EION: interface Wireless 1 ssid Desert
Interface 'Wireless 1': SSID 'Desert'.
EION: interface Wireless 1 encryption ccmp
Interface 'Wireless 1': CCMP enabled.
EION: interface Wireless 1 authentication ieee-802.1x
IEEE 802.1x enabled.
EION: interface Wireless 1 authentication tls
EAP TLS enabled.
EION: interface Wireless 1 authentication md5
EAP MD5 enabled.
EION: interface Wireless 1 authentication ca-cert thawte.crt
Using thawte.crt as CA certificate.
EION: interface Wireless 1 no shutdown
Interface 'Wireless 1' is up.
Important
1. All the mentioned certificates must be uploaded beforehand.
2. In the example above different files are used for client certificate and private key, although
one single file may be used for both.
3. Common Name (CN) from the client certificate is used as a client identity. It's possible to
override this setting using the interface authentication identity command.
4. IEEE 802.1x option (interface authentication ieee-802.1x) is required for all EAP based
authentication modes.
Command Summary
interface {name} {index} encryption tkip
Description. Enable TKIP (WPA) encryption. The command is applicable to both station
(CPE) and access point modes.
No-Form. Disable TKIP.
Arguments. No arguments.
Example.
EION: interface Wireless 1 encryption tkip
Interface 'Wireless 1': TKIP enabled.
EION: interface Wireless 1 encryption no tkip
Interface 'Wireless 1': TKIP disabled.
interface {name} {index} encryption ccmp
Description. Enable CCMP (WPA2) encryption. The command is applicable to both station
(CPE) and access point modes.
No-Form. Disable CCMP.
54
Configuration