7-5
Wireless Security Configuration
Overview
Overview
This chapter describes how to:
â– Configure wireless security
â– Configure encryption
â– Configure key management
â– Configure MAC and 802.1X authentication
â– Configure MAC Lockout and Client/Station Deauthentication
â– Configure AP Authentication
â– Configure Web Authentication