Tkip Countermeasures - 3Com 3CRWX120695A, 3CRWX440095A Configuration Manual

Wireless lan switch and controller
Table of Contents

Advertisement

TKIP
Countermeasures
WPA access points and clients verify the integrity of a wireless frame
received on the network by generating a keyed message integrity check
(MIC). The Michael MIC used with TKIP provides a holddown mechanism
to protect the network against tampering.
If the recalculated MIC matches the MIC received with the frame, the
frame passes the integrity check and the access point or client
processes the frame normally.
If the recalculated MIC does not match the MIC received with the
frame, the frame fails the integrity check. This condition is called a
MIC failure. The access point or client discards the frame and also
starts a 60-second timer. If another MIC failure does not occur within
60 seconds, the timer expires. However, if another MIC failure occurs
before the timer expires, the device takes the following actions:
A MAP access point that receives another frame with an invalid
MIC ends its sessions with all TKIP and WEP clients by
disassociating from the clients. This includes both WPA WEP clients
and non-WPA WEP clients. The access point also temporarily shuts
down the network by refusing all association or reassociation
requests from TKIP and WEP clients. In addition, MSS generates an
SNMP trap that indicates the WX port and radio that received
frames with the two MIC failures as well as the source and
destination MAC addresses in the frames.
A client that receives another frame with an invalid MIC
disassociates from its access point and does not send or accept any
frames encrypted with TKIP or WEP.
The MAP access point or client refuses to send or receive traffic
encrypted with TKIP or WEP for the duration of the countermeasures
timer, which is 60,000 milliseconds (60 seconds) by default. When the
countermeasures timer expires, the access point allows associations
and reassociations and generates new session keys for them. You can
set the countermeasures timer for MAP access point radios to a value
from 0 to 60,000 milliseconds (ms). If you specify 0 ms, the radios do
not use countermeasures but instead continue to accept and forward
encrypted traffic following a second MIC failure. However, MSS still
generates an SNMP trap to inform you of the MIC failure.
The MIC used by CCMP, CBC-MAC, is even stronger than Michael and
does not require or provide countermeasures. WEP does not use a MIC.
Instead, WEP performs a cyclic redundancy check (CRC) on the frame and
generates an integrity check value (ICV).
Configuring WPA
171

Advertisement

Table of Contents
loading

Table of Contents