Securing Bridge-to-Bridge Links

Root bridge to nonroot bridge communications can be secured with LEAP authentication and Cisco TKIP. It is strongly recommended that you use this or IPSec VPN over bridged links to secure the data traffic.

Examples 12-22 and 12-23 provide a deployment example for securing the root to nonroot bridged link using LEAP/with Cisco TKIP configuration. Example 12-22 shows a root bridge configuration in which LEAP authentication is enabled to authenticate the nonroot bridges. As shown in the example, Cisco TKIP is enabled to provide data confidentiality and to protect data integrity between the root and nonroot bridges.

Example 12-22. Security Configuration Required on the IOS-Enabled Root Bridge
 ROOT-BRIDGE(config)# ...

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.