Configuring Clear security profile.
KB ARTICLE TYPE: Configuration
RELATED PRODUCTS: controller
RELATED SOFTWARE VERSIONS: N/A
KEYWORDS: security, profile, subnet
CONFIGURATION STEPS:
GUI steps:
Step 1 : Go to Configuration tab > Click on Security > create security profile with “L2 allowed mode” set to clear with all other settings left to default.
STEP 2: Click OK and save the settings
CLI Steps:
Step 1: Get into the CLI of the controller through telnet, hyper terminal or SSH
Step 2 : Get into config terminal mode and use the following commands
Step 3
: MeruController1# configure
terminal
MeruController1(config)#
security-profile <profile
name>
MeruController1(config-security)#
allowed-l2-modes
clear
MeruController1(config-security)#
exit
MeruController1(config)#
exit
Step 4 : Save the running config to startup config
Step 5 : Use
the following command to see the security
profile
MeruController1# sh security-profile
<profile-name>
MeruController1#
sh security-profile
<profile-name>
Security Profile Table | |
Security Profile Name | <profile-name> |
L2 Modes Allowed | clear |
Data Encrypt | none |
Primary RADIUS Profile Name | |
Secondary RADIUS Profile Name | |
WEP Key (Alphanumeric/Hexadecimal) | ***** |
Static WEP Key Index | 1 |
Re-Key Period (seconds) | 0 |
Captive Portal | disabled |
802.1X Network Initiation | off |
Shared Key Authentication | off |
Pre-shared Key (Alphanumeric/Hexadecimal) | ***** |
Group Keying Interval (seconds) | 0 |
Key Rotation | disabled |
Reauthentication | off |
MAC Filtering | off |
Firewall Capability | none |
Firewall Filter ID | |
Security Logging | off |
Allow mentioned IP/Subnet to pass through Captive portal | 0.0.0.0 |
Subnet Mask for allowed IP/Subnet to pass through Captive portal | 0.0.0.0 |
MeruController1# |
EXPECTED BEHAVIOUR: Wireless clients connecting to the ssid with “clear” security profile will be seeing the network as unsecured. Users would get access to the network without any authentication.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.