User's Manual

– 234
25 Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the VAP interfaces.
auth This command configures authentication for the VAP interface.
Syntax
auth <open-system | shared-key | wpa | wpa-psk | wpa2 | wpa2-psk | wpa-
wpa2-mixed | wpa-wpa2-psk-mixed>
open-system - Accepts the client without verifying its identity using a
shared key. “Open” authentication means either there is no encryption (if
encryption is disabled) or WEP-only encryption is used (if encryption is
enabled).
shared-key - Authentication is based on a WEP shared key that has been
distributed to all stations.
wpa - Clients using WPA are accepted for authentication.
wpa-psk - Clients using WPA with a Pre-shared Key are accepted for
authentication.
wpa2 - Clients using WPA2 are accepted for authentication.
Table 21: Wireless Security Commands
Command Function Mode Page
auth Defines the 802.11 authentication type allowed by the
access point
IC-W-
VAP
237
encryption Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-
VAP
236
key Sets the keys used for WEP encryption IC-W
237
transmit-key Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-
VAP
238
cipher-suite Selects an encryption method for the global key used
for multicast and broadcast traffic
IC-W-
VAP
239
wpa-pre-shared-key Defines a WPA preshared-key value IC-W-
VAP
240
pmksa-lifetime Sets the lifetime PMK security associations IC-W-
VAP
241
make-security-effective Implements wireless security changes made in
current CLI session
IC-W-
VAP
241