Cisco Cisco Access Registrar 4.2 Spécifications Page 260

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 636
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 259
5-76
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 5 Configuring Security Solutions
Configuring AES Key Wrap
5. To see information on attacks that are tracked by access points on a per-signature and per-channel
basis, enter this command:
show wps signature events {standard | custom} precedence# detailed per-signature source_mac
6. To see information on attacks that are tracked by access points on an individual-client basis (by
MAC address), enter this command:
show wps signature events {standard | custom} precedence# detailed per-mac source_mac
Information similar to the following appears:
Source MAC....................................... 00:01:02:03:04:01
Precedence....................................... 1
Signature Name................................... Bcast deauth
Type............................................. Standard
Track............................................ Per Mac
Frequency........................................ 6
Reported By
AP 1
MAC Address.............................. 00:0b:85:01:4d:80
Name..................................... Test_AP_1
Radio Type............................... 802.11/jointfilesconvert/511341/bg
Channel.................................. 4
Last reported by this AP................. Tue Dec 6 00:17:49 2005
AP 2
MAC Address.............................. 00:0b:85:26:91:52
Name..................................... Test_AP_2
Radio Type............................... 802.11/jointfilesconvert/511341/bg
Channel.................................. 6
Last reported by this AP................. Tue Dec 6 00:30:04 2005
Configuring AES Key Wrap
You can use the GUI or CLI to configure a controller to use AES key wrap, which makes the shared
secret between the controller and the RADIUS server more secure. AES key wrap is designed for Federal
Information Processing Standards (FIPS) customers and requires a key-wrap compliant RADIUS
authentication server.
Using the GUI to Configure AES Key Wrap
Follow these steps to configure a controller to use AES key wrap using the GUI.
Step 1 Click Security > AAA > RADIUS > Authentication to open the RADIUS Authentication Servers page
(see Figure 5-44).
Vue de la page 259
1 2 ... 255 256 257 258 259 260 261 262 263 264 265 ... 635 636

Commentaires sur ces manuels

Pas de commentaire

BORK SF NNN 3340 SI manuals

Owner’s manuals and user’s guides for Fans BORK SF NNN 3340 SI.
We providing 1 pdf manuals BORK SF NNN 3340 SI for download free by document types: User Manual






More products and manuals for Fans BORK

Models Document Type
SF TOR 2960 BK User Manual   Инструкция по эксплуатации Bork SF TOR 2960 BK, 11 pages