1、該部分配置主要是針對PSK認證html
一、建立WLAN 2web
二、讓WLAN使用PSK的方式算法
config wlan create 2 OK OK //建立WLAN Profile Name和SSID服務器
config wlan broadcast-ssid enable 2session
config wlan interface 2 management less
onfig wlan security wpa enable 2 //開啓wpa,以支持WPA&WPA2ide
config wlan security wpa akm psk enable 2 //選擇PSK加密
config wlan security wpa akm psk set-key ascii cisco123 1 //給WLAN 1配置的PSK認證密碼時cisco123server
config wlan exclusionlist 2 60 //默認配置,WLAN黑名單的超時時間htm
config wlan security web-auth server-precedence 2 local radius ldap //默認的配置,定義聯繫Web身份驗證服務器的順序。服務器Web身份驗證的默認順序是本地,RADIUS和LDAP。
config wlan enable 2
config wlan wmm allow 2 //默認配置,WMM Policy容許
config wlan session-timeout 2 0 //關閉WLAN Session Timeout
config wlan mfp client enable 2 //Client MFP is not active unless WPA2 is configured
config advanced probe-limit 2 500 //默認配置,Probe request rate-limiting interval
config advanced probe limit 2 500
config wlan security wpa wpa2 ciphers aes enable 2 //開啓WPA2的加密算法爲CCMP的AES,通常建議WPA+TKIP,WPA2+AES
2、該部分配置,主要是針對802.1X認證配置:
一、建立RADIUS server
> config radius auth add <index> <a.b.c.d> 1812 ascii <shared-key>
> config radius auth disable <index>
> config radius auth retransmit-timeout <index> <timeout-seconds>
> config radius auth enable <index>
二、建立WLAN並分配RADIUS server
> config wlan create <id> <profile-name> <ssid-name>
> config wlan radius_server auth add <wlan-id> <radius-index> //WLAN添加RADIUS server,例如config wlan radius_server auth add 2 1
三、配置WLAN開啓AAA-override和會話超時
> config wlan aaa-override enable <wlan-id>
> config wlan session-timeout <wlan-id> <session-timeout-seconds>
四、開啓WLAN
> config wlan enable <wlan-id>
因爲新建立的WLAN,默認就是以下狀況:
對應的配置就忽略了。
相關的其餘信息,能夠參考:
Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3
Configure WLC with LDAP Authentication for 802.1x and Web-Auth WLANs