R2511-HP MSR Router Series WLAN Configuration Guide(V5)

ii
Configuring 802.11n protection mode ·············································································································· 31
Configuring scan parameters ······································································································································· 31
Displaying and maintaining WLAN RRM···················································································································· 32
Configuring WLAN security ······································································································································ 33
Overview ········································································································································································· 33
Authentication modes ············································································································································ 33
WLAN data security ············································································································································· 34
Client access authentication ································································································································· 35
Protocols and standards ······································································································································· 35
Configuring WLAN security ·········································································································································· 36
Configuration task list ··········································································································································· 36
Enabling an authentication method ····················································································································· 36
Configuring the PTK lifetime ································································································································· 37
Configuring the GTK rekey method ····················································································································· 37
Configuring security IE ·········································································································································· 38
Configuring cipher suite ······································································································································· 39
Configuring port security ······································································································································ 40
Displaying and maintaining WLAN security ······································································································ 42
WLAN security configuration examples ······················································································································ 42
PSK authentication configuration example ········································································································· 42
MAC and PSK authentication configuration example ······················································································· 43
802.1X authentication configuration example ·································································································· 46
Supported combinations for ciphers ···························································································································· 51
Configuring WLAN IDS ············································································································································· 54
Overview ········································································································································································· 54
Terminology ··························································································································································· 54
Attack detection ····················································································································································· 54
Blacklist and white list ··········································································································································· 55
WLAN IDS configuration task list ································································································································· 56
Configuring AP operating mode ·································································································································· 56
Configuring attack detection ········································································································································· 57
Configuring attack detection ································································································································ 57
Displaying and maintaining attack detection ····································································································· 57
Configuring blacklist and whitelist ······························································································································· 58
Configuring static lists ··········································································································································· 58
Configuring dynamic blacklist ····························································································································· 58
Displaying and maintaining blacklist and whitelist ··························································································· 58
WLAN IDS configuration examples ····························································································································· 59
WLAN IDS configuration example ······················································································································ 59
Blacklist and whitelist configuration example ···································································································· 60
Configuring WLAN QoS ··········································································································································· 61
Overview ········································································································································································· 61
Terminology ··························································································································································· 61
WMM protocol ······················································································································································ 61
Protocols and standards ······································································································································· 63
Configuring WMM ························································································································································ 63
Configuration restrictions and guidelines ··········································································································· 63
Configuration procedure ······································································································································ 64
Displaying and maintaining WMM ···················································································································· 65
WMM configuration examples ···························································································································· 65
Troubleshooting ····················································································································································· 69
Configuring client rate limiting ····································································································································· 69
Configuration procedure ······································································································································ 70