Note

Professional Access Point

Administrator Guide

Shared secret keys can include spaces and special characters if the key is placed inside quotation marks as in the first example above. If the key is a string of characters with no spaces or special char- acters in it, the quotation marks are not necessary as in the second example above..

5. Get Current Security Settings After Re-Configuring to WPA/WPA2 Personal (PSK)

Now you can use the "get" command again to view the updated security configuration and see the results of your new settings.

The following command gets the security mode in use on the Internal network:

USR5453-AP#get interface wlan0 security wpa-personal

The following command gets details on how the internal network is configured, including details on Security.

USR5453-AP#get bss wlan0bssInternal detail

FieldValue

---------------------------------------------

status

up

description

Internal

radio

wlan0

beacon-interface

wlan0

mac

00:0C:41:16:DF:A6

dtim-period

 

max-stations

off

ignore-broadcast-ssid

mac-acl-mode

deny-list

mac-acl-name

wlan0bssInternal

radius-accounting

127.0.0.1

radius-ip

radius-key

secret

open-system-authentication

 

shared-key-authentication

on

wpa-cipher-tkip

wpa-cipher-ccmp

on

wpa-allowed

on

wpa2-allowed

on

rsn-preauthentication

 

Set Security to WPA/WPA2 Enterprise (RADIUS)

1.Set the Security Mode

2.Set the WPA Versions

3.Enable Pre-Authentication

4.Set the Cipher Suites

5.Set the Authentication Server

6.Set the RADIUS Key (For External RADIUS Server Only)

7.Enable RADIUS Accounting (External RADIUS Server Only))

8.Get Current Security Settings After Re-Configuring to WPA/WPA2 Enterprise (RADIUS)

Class Structure, Commands, and Examples - 223

Page 223
Image 223
USRobotics Instant802 APSDK manual USR5453-AP#get interface wlan0 security wpa-personal