3Com 3CRWEASYA73 / WL-575 User Manual page 302

Outdoor 11a building to building bridge and 11bg access point
Hide thumbs Also See for 3CRWEASYA73 / WL-575:
Table of Contents

Advertisement

C
6: C
L
HAPTER
OMMAND
INE
Example
AP (if-wireless g: VAP[0])#cipher-suite TKIP
AP (if-wireless g)#
mic_mode
This command specifies how to calculate the Message Integrity Check (MIC).
Syntax
Default Setting
Command Mode
I
NTERFACE
and a re-keying mechanism. Select TKIP if there are clients in the network
that are not WPA2 compliant.
• TKIP defends against attacks on WEP in which the unencrypted
initialization vector in encrypted packets is used to calculate the WEP key.
TKIP changes the encryption key on each packet, and rotates not just the
unicast keys, but the broadcast keys as well. TKIP is a replacement for WEP
that removes the predictability that intruders relied on to determine the
WEP key.
• AES-CCMP (Advanced Encryption Standard Counter-Mode/CBCMAC
Protocol): WPA2 is backward compatible with WPA, including the same
802.1X and PSK modes of operation and support for TKIP encryption. The
main enhancement is its use of AES Counter-Mode encryption with Cipher
Block Chaining Message Authentication Code (CBC-MAC) for message
integrity. The AES Counter-Mode/CBCMAC Protocol (AES-CCMP)
provides extremely robust data confidentiality using a 128-bit key. The
AES-CCMP encryption cipher is specified as a standard requirement for
WPA2. However, the computational intensive operations of AES-CCMP
requires hardware support on client devices. Therefore to implement
WPA2 in the network, wireless clients must be upgraded to
WPA2-compliant hardware.
mic_mode <hardware | software>
• hardware - Uses hardware to calculate the MIC.
• software - Uses software to calculate the MIC.
software
Interface Configuration (Wireless)
6-170

Advertisement

Table of Contents
loading

Table of Contents