Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco
software image support. To access Cisco Feature Navigator, go to
http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Prerequisites for WLANs
You can associate up to 16 WLANs with each access
point group and assign specific access points to
each group. Each access point advertises only the
enabled WLANs that belong to its access point
group. The access point (AP) does not advertise
disabled WLANs in its access point group or WLANs
that belong to another group.
We recommend that you assign one set of VLANs for WLANs and a different set of VLANs for management interfaces to ensure that controllers properly route VLAN traffic.
The controller uses different attributes to differentiate between WLANs with the same Service Set Identifier (SSID).
WLANs with the same SSID and same Layer 2 policy cannot be created if the WLAN ID is lower than 17.
Two WLANs with IDs that are greater than 17 and that have the same SSID and same Layer 2 policy is allowed if WLANs are added in different AP groups.
Note
This requirement ensures that clients never detect the SSID present on the same access point radio.
Information About AAA Override
The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the AAA server.
Switch(config-wlan)# security static-wep-key encryption 40 hex 0 test 2
Configures static WEP security on a WLAN.
The keywords and arguments are as follows:
authentication—Configures 802.11 authentication.
encryption—Sets the static WEP keys and indices.
open— Configures open system authentication.
sharedkey—Configures shared key authentication.
104, 40 — Specifies the WEP key size.
hex, ascii—Specifies the input format of the key.
wep-key-index—Type of password that follows. A value of 0 indicates that an unencrypted password follows. A value of 8 indicates that an AES encrypted follows.
Step 4
end
Example:
Switch(config)# end
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode.
authentication—Specifies the authentication type you can set. The values are open and shared.
encryption—Specifies the encryption type that you can set. The valid values are 104 and 40. 40-bit keys must contain 5 ASCII text characters or 10 hexadecimal characters. 104-bit keys must contain 13 ASCII text characters or 26 hexadecimal characters
ascii—Specifies the key format as ASCII.
hex—Specifies the key format as HEX.
Step 4
end
Example:
Switch(config)# end
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode.
authentication-list—Specifies the authentication list for IEEE 802.1X.
encryption—Specifies the length of the CKIP encryption key. The valid values are 0, 40, and 104. Zero (0) signifies no encryption. This is the default.
Note
All keys within a WLAN must be of the same size.
Step 5
end
Example:
Switch(config)# end
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode.
The Cisco Support website provides extensive online resources,
including documentation and tools for troubleshooting and
resolving technical issues with Cisco products and technologies.
To receive security and technical information about your
products, you can subscribe to various services, such as the
Product Alert Tool (accessed from Field Notices), the Cisco
Technical Services Newsletter, and Really Simple Syndication
(RSS) Feeds.
Access to most tools on the Cisco Support website requires a
Cisco.com user ID and password.