Reactivating Wireless Connections - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Reactivating Wireless Connections

Related
Documentation
396
Table 90: WPA Personal Mode Settings (continued)
Parameters
Description
Encryption
The encryption setting specifies the encryption method used between the
security device and wireless clients in the subnetwork. Select one of the
following:
AES—The Advanced Encryption Standard (AES) is used by WPA 2 devices.
AES uses the Robust Security Network (RSN) cipher for encryption. This
complex encryption mechanism is a block cipher (operates on 128 bit data
blocks).
TKIP—The Temporal Key Integrity Protocol (TKIP) is used by WPA 1 devices.
TKIP is a key management protocol that handles key generation and key
synchronization; TKIP uses the RC4 algorithm for encryption.
Auto—When enabled, the device uses the encryption method (AES or TKIP)
used by the client.
Virtual Routers Overview on page 296
Configuring General Wireless Settings on page 382
Configuring Advanced Wireless Settings on page 385
Configuring Wireless MAC Access Lists on page 389
Configuring Wireless General SSID Settings on page 390
Reactivating Wireless Connections on page 396
When you make changes to the wireless settings on the security device, you must update
the device with your changes before the new settings take effect.
NOTE: When using an authentication server for wireless authentication, if
you enable 802.1X support on that server, you must also reactive the WLAN
subsystem before the change can take effect.
Additionally, the device must reactivate its WLAN subsystem to use the new settings.
NSM automatically reactivates the WLAN subsystem within the NetScreen-5GT Wireless
security device during the device update process.
The reactivation process takes several seconds (approximately 10 seconds) to complete.
During reactivation of the WLAN subsystem, the device severs all wireless connections
and clears all wireless sessions from the session table. Previously connected wireless
clients must reconnect to reestablish their disrupted sessions.
Virtual Routers Overview on page 296
Configuring General Wireless Settings on page 382
Configuring Advanced Wireless Settings on page 385
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?

Table of Contents