Configuring Campus Intranet Security
Context
A typical large or midsize campus network uses a three-layer architecture, consisting of the core layer, aggregation layer, and access layer. Simplified networks may use a two-layer architecture, consisting of only the core layer and access layer. Security features can be configured layer by layer to ensure comprehensive intranet security. For details about each security function and their application scenario, see Intranet Security Design.
Configuration Tasks
Network Layer |
Description |
Operation Procedure |
---|---|---|
Access layer (access switch) |
|
|
Access layer (WLAN air interface security) |
|
Log in to the web system or CLI of the WAC to configure these functions. |
Access layer (WLAN terminal access security) |
Configuring security policies |
Log in to the web system or CLI of the WAC to configure security policies. For details, see "Configuring WLAN Services" in WLAN Configuration (Distributed Gateway) and WLAN Configuration (Centralized Gateway). |
Access layer (WLAN service security) |
Configuring DTLS encryption |
Log in to the web system or CLI of the WAC to configure DTLS encryption. |
Aggregation layer |
|
|
Core layer |
|
To ensure that the CPU can process and respond to normal services, CPU protection functions are configured on the core switch by default. To adjust the parameters of these functions, you can run commands on the core switch. You are advised to perform the operations under the guidance of professional technical personnel. |