3Com 3CRWEASYA73 / WL-575 User Manual page 303

Outdoor 11a building to building bridge and 11bg access point
Hide thumbs Also See for 3CRWEASYA73 / WL-575:
Table of Contents

Advertisement

Command Usage
• The Michael Integrity Check (MIC) is part of the Temporal Key Integrity
Protocol (TKIP) encryption used in Wi-Fi Protected Access (WPA) security.
The MIC calculation is performed in the access point for each transmitted
packet and this can impact throughput and performance. The access point
supports a choice of hardware or software for MIC calculation. The
performance of the access point can be improved by selecting the best
method for the specific deployment.
• Using the "hardware" option provides best performance when the
number of supported clients is less than 27.
• Using the "software" option provides the best performance for a large
number of clients on one radio interface. Throughput may be reduced
when both 802.11a and 802.11g interfaces are supporting a high number
of clients simultaneously.
Example
AP (if-wireless a)#mic_mode hardware
AP (if-wireless g)#
wpa-pre-shared-key
This command defines a Wi-Fi Protected Access (WPA/WPA2) Pre-shared-key.
Syntax
wpa-pre-shared-key <hex | passphrase-key> <value>
• hex - Specifies hexadecimal digits as the key input format.
• passphrase-key - Specifies an ASCII pass-phrase string as the key input
format.
• value - The key string. For ASCII input, specify a string between 8 and 63
characters. For HEX input, specify exactly 64 digits.
Command Mode
Interface Configuration (Wireless-VAP)
Command Usage
• To support WPA or WPA2 for client authentication, use the auth
command to specify the authentication type, and use the
wpa-preshared-key command to specify one static key.
• If WPA or WPA2 is used with pre-shared-key mode, all wireless clients
must be configured with the same pre-shared key to communicate with
the access point's VAP interface.
6-171
Using the Command Line Interface

Advertisement

Table of Contents
loading

Table of Contents