
D-Link DWS-1008 User Manual xi
Committing a Security ACL................................................................................................231
Viewing Security ACL Information .....................................................................................231
Viewing the Edit Buffer ..................................................................................................232
Viewing Committed Security ACLs................................................................................232
Viewing Security ACL Details ........................................................................................233
Displaying Security ACL Hits.........................................................................................233
Clearing Security ACLs......................................................................................................234
Mapping Security ACLs............................................................................................................234
Mapping User-Based Security ACLs .................................................................................235
Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed APs.......................236
Displaying ACL Maps to Ports, VLANs, and Virtual Ports..............................................237
Clearing a Security ACL Map ........................................................................................237
Modifying a Security ACL .........................................................................................................238
Adding Another ACE to a Security ACL.............................................................................239
Placing One ACE before Another ......................................................................................240
Modifying an Existing Security ACL...................................................................................241
Clearing Security ACLs from the Edit Buffer......................................................................242
Using ACLs to Change CoS .....................................................................................................243
Filtering Based on DSCP Values .......................................................................................244
Using the dscp Option ...................................................................................................244
Using the precedence and tos Options .........................................................................245
Enabling Prioritization for Legacy Voice over IP .......................................................................246
General Guidelines............................................................................................................246
Enabling VoIP Support for TeleSym VoIP...........................................................................247
Enabling SVP Optimization for SpectraLink Phones .........................................................248
Known Limitations .........................................................................................................248
Configuring a Service Profile for RSN (WPA2)..............................................................249
Configuring a Service Profile for WPA ...........................................................................249
Configuring a Radio Profile............................................................................................250
Configuring a VLAN and AAA for Voice Clients .............................................................250
Configuring an ACL to Prioritize Voice Traffic ................................................................251
Reason the ACL Needs To Be Mapped to Both Traffic Directions .................................252
Setting 802.11b/g Radios to 802.11b (for Siemens SpectraLink VoIP Phones only).....252
Disabling RF Auto-Tuning Before Upgrading a SpectraLink Phone...............................253
Restricting Client-To-Client Forwarding Among IP-Only Clients...............................................253
Security ACL Configuration Scenario.......................................................................................254
Managing Keys and Certificates .................................................................................................255
Why Use Keys and Certificates? ..............................................................................................255
Wireless Security through TLS ..........................................................................................255
PEAP-MS-CHAP-V2 Security............................................................................................256
About Keys and Certificates .....................................................................................................256
Public Key Infrastructures ..................................................................................................257
Public and Private Keys .....................................................................................................257
Digital Certificates..............................................................................................................258
PKCS #7, PKCS #10, and PKCS #12 Object Files ...........................................................258
Certificates Automatically Generated by MSS..........................................................................260
Creating Keys and Certificates ................................................................................................260
Choosing the Appropriate Certificate Installation Method for Your Network ......................261