1、该部分配置主要是针对PSK认证html
一、建立WLAN 2web
二、让WLAN使用PSK的方式算法
config wlan create 2 OK OK //建立WLAN Profile Name和SSID服务器
config wlan broadcast-ssid enable 2session
config wlan interface 2 management less
onfig wlan security wpa enable 2 //开启wpa,以支持WPA&WPA2ide
config wlan security wpa akm psk enable 2 //选择PSK加密
config wlan security wpa akm psk set-key ascii cisco123 1 //给WLAN 1配置的PSK认证密码时cisco123server
config wlan exclusionlist 2 60 //默认配置,WLAN黑名单的超时时间htm
config wlan security web-auth server-precedence 2 local radius ldap //默认的配置,定义联系Web身份验证服务器的顺序。服务器Web身份验证的默认顺序是本地,RADIUS和LDAP。
config wlan enable 2
config wlan wmm allow 2 //默认配置,WMM Policy容许
config wlan session-timeout 2 0 //关闭WLAN Session Timeout
config wlan mfp client enable 2 //Client MFP is not active unless WPA2 is configured
config advanced probe-limit 2 500 //默认配置,Probe request rate-limiting interval
config advanced probe limit 2 500
config wlan security wpa wpa2 ciphers aes enable 2 //开启WPA2的加密算法为CCMP的AES,通常建议WPA+TKIP,WPA2+AES
2、该部分配置,主要是针对802.1X认证配置:
一、建立RADIUS server
> config radius auth add <index> <a.b.c.d> 1812 ascii <shared-key>
> config radius auth disable <index>
> config radius auth retransmit-timeout <index> <timeout-seconds>
> config radius auth enable <index>
二、建立WLAN并分配RADIUS server
> config wlan create <id> <profile-name> <ssid-name>
> config wlan radius_server auth add <wlan-id> <radius-index> //WLAN添加RADIUS server,例如config wlan radius_server auth add 2 1
三、配置WLAN开启AAA-override和会话超时
> config wlan aaa-override enable <wlan-id>
> config wlan session-timeout <wlan-id> <session-timeout-seconds>
四、开启WLAN
> config wlan enable <wlan-id>
因为新建立的WLAN,默认就是以下状况:
对应的配置就忽略了。
相关的其余信息,能够参考:
Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3
Configure WLC with LDAP Authentication for 802.1x and Web-Auth WLANs