Wireless Controller
Dedicated Wi-Fi control and management for high density and mobility
nsamuel
Staff
Staff
Article Id 192839
Description

Configuring Clear security profile.


Scope

KB ARTICLE TYPE: Configuration

RELATED PRODUCTS: controller

RELATED SOFTWARE VERSIONS: N/A

KEYWORDS: security, profile, subnet


Solution

CONFIGURATION STEPS:

GUI steps:

Step 1 : Go to Configuration tab > Click on Security > create security profile with “L2 allowed mode” set to clear with all other settings left to default.

STEP 2: Click OK and save the settings

CLI Steps:

Step 1: Get into the CLI of the controller through telnet, hyper terminal or SSH

Step 2 : Get into config terminal mode and use the following commands

Step 3 : MeruController1# configure terminal
MeruController1(config)# security-profile <profile name>
MeruController1(config-security)# allowed-l2-modes clear
MeruController1(config-security)# exit
MeruController1(config)# exit

Step 4 : Save the running config to startup config

Step 5 : Use the following command to see the security profile
MeruController1# sh security-profile <profile-name>
MeruController1# sh security-profile <profile-name>

Security Profile Table

Security Profile Name

<profile-name>

L2 Modes Allowed

clear

Data Encrypt

none

Primary RADIUS Profile Name


Secondary RADIUS Profile Name


WEP Key (Alphanumeric/Hexadecimal)

*****

Static WEP Key Index

1

Re-Key Period (seconds)

0

Captive Portal

disabled

802.1X Network Initiation

off

Shared Key Authentication

off

Pre-shared Key (Alphanumeric/Hexadecimal)

*****

Group Keying Interval (seconds)

0

Key Rotation

disabled

Reauthentication

off

MAC Filtering

off

Firewall Capability

none

Firewall Filter ID


Security Logging

off

Allow mentioned IP/Subnet to pass through Captive portal

0.0.0.0

Subnet Mask for allowed IP/Subnet to pass through Captive portal

0.0.0.0

MeruController1#


EXPECTED BEHAVIOUR: Wireless clients connecting to the ssid with “clear” security profile will be seeing the network as unsecured. Users would get access to the network without any authentication.


Contributors