User's Manual
– 234 –
25 Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the VAP interfaces.
auth This command configures authentication for the VAP interface.
Syntax
auth <open-system | shared-key | wpa | wpa-psk | wpa2 | wpa2-psk | wpa-
wpa2-mixed | wpa-wpa2-psk-mixed>
open-system - Accepts the client without verifying its identity using a
shared key. “Open” authentication means either there is no encryption (if
encryption is disabled) or WEP-only encryption is used (if encryption is
enabled).
shared-key - Authentication is based on a WEP shared key that has been
distributed to all stations.
wpa - Clients using WPA are accepted for authentication.
wpa-psk - Clients using WPA with a Pre-shared Key are accepted for
authentication.
wpa2 - Clients using WPA2 are accepted for authentication.
Table 21: Wireless Security Commands
Command Function Mode Page
auth Defines the 802.11 authentication type allowed by the
access point
IC-W-
VAP
237
encryption Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-
VAP
236
key Sets the keys used for WEP encryption IC-W
237
transmit-key Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-
VAP
238
cipher-suite Selects an encryption method for the global key used
for multicast and broadcast traffic
IC-W-
VAP
239
wpa-pre-shared-key Defines a WPA preshared-key value IC-W-
VAP
240
pmksa-lifetime Sets the lifetime PMK security associations IC-W-
VAP
241
make-security-effective Implements wireless security changes made in
current CLI session
IC-W-
VAP
241