Extreme Networks Summit WM Series Betriebsanweisung Seite 139

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 268
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 138
Configuring privacy for a WM-AD
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
139
5 From the WEP Key Length drop-down list, select the WEP encryption key length:
40-bit
104-bit
128-bit
6 Select one of the following input methods:
Input Hex – If you select Input Hex, type the WEP key input in the WEP Key box. The key is
generated automatically, based on the input.
Input String – If you select Input String, type the secret WEP key string used for encrypting and
decrypting in the WEP Key String box. The WEP Key box is automatically filled by the
corresponding Hex code.
7 To save your changes, click Save.
Dynamic WEP privacy for an AAA WM-AD
The dynamic key WEP mechanism changes the key for each user and each session.
To set up dynamic WEP privacy for a selected AAA WM-AD:
1 From the main menu, click WM Access Domain Configuration. The WM Access Domain
Configuration screen is displayed.
2 In the left pane WM Access Domains list, click the AAA WM-AD you want to set up dynamic WEP
privacy for. The To pol og y tab is displayed.
3 Click the Privacy tab.
4 Select Dynamic Keys.
5 To save your changes, click Save.
Wi-Fi Protected Access (WPA v1 and WPA v2) Privacy for an AAA WM-AD
The WM-AD Privacy feature supports Wi-Fi Protected Access (WPA v1 and WPA v2), a security
solution that adds authentication to enhanced WEP encryption and key management.
The authentication portion of WPA for AAA is in Enterprise Mode:
Specifies 802.1x with Extensible Authentication Protocol (EAP)
Requires a RADIUS or other authentication server
Uses RADIUS protocols for authentication and key distribution
Centralizes management of user credentials
The encryption portion of WPA v1 is Temporal Key Integrity Protocol (TKIP). TKIP includes:
A per-packet key mixing function that shares a starting key between devices, and then changes their
encryption key for every packet (unicast key) or after the specified re-key time interval (broadcast
key) expires
An extended WEP key length of 256-bits
An enhanced Initialization Vector (IV) of 48 bits, instead of 24 bits, making it more difficult to
compromise
Seitenansicht 138
1 2 ... 134 135 136 137 138 139 140 141 142 143 144 ... 267 268

Kommentare zu diesen Handbüchern

Keine Kommentare