Configuring WPA2-PSK security profile
KB ARTICLE TYPE: Configuration
RELATED PRODUCTS: controller, WPA-PSK, security profile
RELATED SOFTWARE VERSIONS: N/A
KEYWORDS: Ascom, practice, battery
CONFIGURATION STEPS:
GUI STEPS:
Step 1: Go to Configuration tab > Click on Security > Click Add.
Step 2: Select WPA2-PSK keys under L2 Modes Allowed, data encrypt mode will be set to CCMP-AES.
Step 3: Pre-shared Key (Alphanumeric/Hexadecimal). In the Pre-shared Key text box, enter the key that is to be used for WPA2-PSK. The key can be from 8 to 63 ASCII characters or 64 hex characters (hex keys must use the prefix "0x" or the key will not work).
Step 4: Leave reset of the settings as default >> click OK and save the settings
CLI STEPS:
Step 1: Get into the CLI of the controller, through SSH
Step 2: Get into config terminal mode and use the following commands
Step 3 :
MeruController1(config)# security-profile
<profile-name>
MeruController1(config-security)#
allowed-l2-modes
wpa2-psk
MeruController1(config-security)#
psk key
<key>
MeruController1(config-security)#
encryption-modes
ccmp-aes
MeruController1(config-security)#
exit
MeruController1(config)#
Step 4: Save the running config to startup config
Step 5: Now to use the security profile map it to ess profile
TEST RESULTS: Wireless clients connecting to the ssid with WPA2-PSK security profile will be seeing the network as secured and has to provide the PSK-key to get authenticated into the network.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.