
5-57
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring Client Exclusion Policies
Using the CLI to Debug MFP Issues
Use these commands if you experience any problems with MFP:
• debug wps mfp ? {enable | disable}
where ? is one of the following:
client—Configures debugging for client MFP messages.
lwapp—Configures debugging for MFP messages between the controller and access points.
detail—Configures detailed debugging for MFP messages.
report—Configures debugging for MFP reporting.
mm—Configures debugging for MFP mobility (inter-controller) messages.
Configuring Client Exclusion Policies
Follow these steps to configure the controller to exclude clients under certain conditions using the
controller GUI.
Step 1 Click Security > Wireless Protection Policies > Client Exclusion Policies to open the Client Exclusion
Policies page.
Step 2 Check any of these check boxes if you want the controller to exclude clients for the condition specified.
The default value for each exclusion policy is enabled.
• Excessive 802.11 Association Failures—Clients are excluded on the sixth 802.11 association
attempt, after five consecutive failures.
• Excessive 802.11 Authentication Failures—Clients are excluded on the sixth 802.11
authentication attempt, after five consecutive failures.
• Excessive 802.1X Authentication Failures—Clients are excluded on the fourth 802.1X
authentication attempt, after three consecutive failures.
• IP Theft or IP Reuse—Clients are excluded if the IP address is already assigned to another device.
• Excessive Web Authentication Failures—Clients are excluded on the fourth web authentication
attempt, after three consecutive failures.
Step 3 Click Apply to commit your changes.
Step 4 Click Save Configuration to save your changes.
Configuring Identity Networking
These sections explain the identity networking feature, how it is configured, and the expected behavior
for various security policies:
• Identity Networking Overview, page 5-58
• RADIUS Attributes Used in Identity Networking, page 5-58
• Configuring AAA Override, page 5-61
Commentaires sur ces manuels