6-27
Cisco Wireless LAN Controller Configuration Guide
OL-17037-01
Chapter 6 Configuring WLANsWireless Device Access
Configuring WLANs
config wlan ccx aironet-ie enable wlan_id
Step 3 Enter this command to enable or disable CKIP for the WLAN:
config wlan security ckip {enable | disable} wlan_id
Step 4 Enter this command to specify a CKIP encryption key for the WLAN:
config wlan security ckip akm psk set-key wlan_id {40 | 104} {hex | ascii} key key_index
Step 5 Enter this command to enable or disable CKIP MMH MIC for the WLAN:
config wlan security ckip mmh-mic {enable | disable} wlan_id
Step 6 Enter this command to enable or disable CKIP key permutation for the WLAN:
config wlan security ckip kp {enable | disable} wlan_id
Step 7 Enter this command to enable the WLAN:
config wlan enable wlan_id
Step 8 Enter this command to save your settings:
save config
Configuring a Session Timeout
Using the controller GUI or CLI, you can configure a session timeout for wireless clients on a WLAN.
The session timeout is the maximum time for a client session to remain active before requiring
reauthorization.
Using the GUI to Configure a Session Timeout
Using the controller GUI, follow these steps to configure a session timeout for wireless clients on a
WLAN.
Step 1 Click WLANs to open the WLANs page.
Step 2 Click the ID number of the WLAN for which you want to assign a session timeout.
Step 3 When the WLANs > Edit page appears, click the Advanced tab. The WLANs > Edit (Advanced) page
appears.
Step 4 To configure a session timeout for this WLAN, check the Enable Session Timeout check box.
Otherwise, uncheck the check box. The default value is checked.
Step 5 In the Session Timeout field, enter a value between 300 and 86400 seconds to specify the duration of the
client session. The default value is 1800 seconds for the following Layer 2 security types: 802.1X; Static
WEP+802.1X; and WPA+WPA2 with 802.1X, CCKM, or 802.1X+CCKM authentication key
management and 0 seconds for all other Layer 2 security types. A value of 0 is equivalent to no timeout.
Note When using WPA1 or WPA2, if the timeout is set to infinite, the clients still reauthenticate at a
frequency of 12 hours. The workaround is to enable the AAA override and push through the
radius server a longer session timeout period. The timeout period can be longer than one day,
which is the maximum period you can manually configure.