Cisco Cisco Aironet 1524 Lightweight Outdoor Mesh Access Point
14
Mobile Access Router and Mesh Networks Design Guide
OL-11823-01
Security
Step 3
To specify the SSID the AP will use, enter:
bridge(config-if)# ssid
given ssid
Step 4
To specify the authentication type to be used, enter:
bridge(config-if)# authentication open
Step 5
To specify the radio channel the AP will operate on, enter:
bridge(config-if)# channel 11
Step 6
To specify for the WMIC to function as a root access point, enter:
bridge(config-if)# station-role root access-point
Step 7
Enter the end command to complete the configuration.
Step 8
To make a backup copy of the configuration, enter:
bridge# copy running-config startup-config
Security
This section describes the security features of the WMIC.
Authentication Types
This section describes the authentication types that you can configure on the WMIC. The authentication
types are tied to the SSID that you configure on the WMIC. Before wireless devices can communicate,
they must authenticate to each other using open, 802.1x/EAP based or shared-key authentication. For
maximum security, wireless devices should also authenticate to your network using EAP authentication,
an authentication type that relies on the presence of an authentication server on your network.
types are tied to the SSID that you configure on the WMIC. Before wireless devices can communicate,
they must authenticate to each other using open, 802.1x/EAP based or shared-key authentication. For
maximum security, wireless devices should also authenticate to your network using EAP authentication,
an authentication type that relies on the presence of an authentication server on your network.
The WMIC uses four authentication mechanisms or types and can use more than one at the same time.
These sections explain each authentication type:
•
•
•
•
Open Authentication to the WMIC
Open authentication allows any wireless device to authenticate and then attempt to communicate with
another wireless device. Open authentication does not rely on a RADIUS server on your network.
another wireless device. Open authentication does not rely on a RADIUS server on your network.
shows the authentication sequence between a non-root bridge and a root device using open
authentication. In this example, the non-root bridge's WEP key does not match the bridge's key, so it can
authenticate but it cannot pass data.
authenticate but it cannot pass data.