Você está na página 1de 4

#CONFIGURAO DE 1 SSID

in bvi 1
ip add 192.168.200.1 255.255.255.0
no shut
exit

line con 0
logg sy
exit

dot11 ssid redes


authentication open
guest-mode
authentication key-management wpa
wpa-psk ascii 0 Redes2014

interface dot11radio 0
encryption mode ciphers aes-ccm tkip
ssid redes
channel 1
no shut

#MLTIPLOS SSIDs

dot11 mbssid

dot11 vlan-name competidor1 vlan 10


dot11 vlan-name competidor2 vlan 20
dot11 vlan-name competidor3 vlan 30

dot11 ssid competidor1


vlan 10
authentication open
mbssid guest-mode
authentication key-management wpa
wpa-psk ascii 0 Redes2014

in dot11Radio 0
encryption vlan 10 mode ciphers aes-ccm tkip
dot11 ssid competidor2
vlan 20
authentication open
mbssid guest-mode
authentication key-management wpa
wpa-psk ascii 0 Redes@2014

in dot11Radio 0
encryption vlan 20 mode ciphers aes-ccm tkip

dot11 ssid competidor3


vlan 30
authentication open
mbssid guest-mode

in dot11Radio 0
mbssid
ssid competidor1
ssid competidor2
ssid competidor3
no shutdown

in dot11Radio 0.10
encapsulation dotq 10
bridge-group 10
ip add 192.168.10.253 255.255.255.0 #para comunicao com os clientes da rede wifi

in dot11Radio 0.20
encapsulation dot1q 20
bridge-group 20

in dot11Radio 0.30
encapsulation dot1q 30
bridge-group 30

int fast 0
no shutdown

in fast0.10
encapsulation dot1q 10
bridge-group 10
ip add 192.168.10.253 255.255.255.0 #para comunicao com os clientes cabeados

in fast0.20
encapsulation dot1q 20
bridge-group 20

in fast0.30
encapsulation dot1q 30
bridge-group 30

#1 SSID COM AUTENTICAO RADIUS

int bvi 1
ip add 192.168.10.2 255.255.255.0
no shut
exit

aaa new-model

radius-server host 192.168.10.1 auth-port 1812 acct-port 1813 key CISCO

aaa group server radius rad_eap


server 192.168.10.1 auth-port 1812 acct-port 1813
exit

aaa authentication login eap_methods group rad_eap

dot11 ssid PEAP


authentication open eap eap_methods
authentication network-eap eap_methods
guest-mode

int dot 0
encryption mode wep mandotory
ssid PEAP
no shut
exit

#*A configurao do radius a padro..


#*Tbm no esquecer de criar o certificado auto-assanido no IIS seno dar erro de
protocolo EAP no pode ser processado pelo servidor
#*No cliente no preciso realizar configuraomas se for preciso so marcar o tipo
de segurana 802.1x

Você também pode gostar