236

AT-TQ2403 - Management Software - User's Guide

 

 

For our example, we’ll disable RADIUS accounting since we’re using the built-in server:

AT-TQ2403# set bss wlan0bssInternal radius-accounting off

5. Get Current Security Settings After Re-Configuring to IEEE 802.1x Security Mode

Now we can use the "get" command again to view the updated security configuration and see the results of our new settings.

The following command gets the security mode in use on the Internal network:

AT-TQ2403# get interface wlan0 security dot1x

The following command gets details on how the internal BSS is configured, including details on Security.

AT-TQ2403# get bss wlan0bssInternal detail

PropertyValue

-------------------------------------------------------------------------------

status

up

description

Internal

radio

wlan0

beacon-interface

wlan0

mac

00:01:02:03:02:00

dtim-period

2

max-stations

2007

ignore-broadcast-ssid

off

mac-acl-mode

deny-list

mac-acl-name

default

radius-accounting

off

radius-ip

127.0.0.1

radius-key

secret

radius-port

1812

radius-accounting-port

1813

vlan-tagged-interface

br0

open-system-authentication

on

shared-key-authentication

off

wpa-allow-non-wpa-stations

off

wpa-cipher-tkip

on

wpa-cipher-ccmp

off

wpa-allowed

on

wpa2-allowed

on

rsn-preauthentication

off

Set Security to WPA/WPA2 Personal (PSK)

1.Set the Security Mode

2.Set the WPA Versions

3.Set the Cipher Suites

4.Set the Pre-shared Key

5.Get Current Security Settings After Re-Configuring to WPA/WPA2 Personal (PSK)

1.Set the Security Mode

AT-TQ2403# set interface wlan0 security wpa-personal