Extreme Networks Summit WM20 User Manual page 138

Version 4.2
Hide thumbs Also See for Summit WM20:
Table of Contents

Advertisement

WM Access Domain Services Configuration
152-bit
6 Select one of the following input methods:
Input Hex – If you select Input Hex, type the WEP key input in the WEP Key box. The key is
generated automatically, based on the input.
Input String – If you select Input String, type the secret WEP key string used for encrypting and
decrypting in the WEP Key String box. The WEP Key box is automatically filled by the
corresponding Hex code.
7 To save your changes, click Save.
Dynamic WEP Privacy for an AAA WM-AD
The dynamic key WEP mechanism changes the key for each user and each session.
To set up dynamic WEP privacy for a selected AAA WM-AD:
1 From the main menu, click WM-AD Configuration. The WM-AD Configuration screen is
displayed.
2 In the left pane WM Access Domains list, click the AAA WM-AD you want to set up dynamic WEP
privacy for. The Topology tab is displayed.
3 Click the Privacy tab.
4 Select Dynamic Keys.
5 To save your changes, click Save.
Wi-Fi Protected Access (WPA v1 and WPA v2) Privacy for an AAA WM-AD
The WM-AD Privacy feature supports Wi-Fi Protected Access (WPA v1 and WPA v2), a security
solution that adds authentication to enhanced WEP encryption and key management.
The authentication portion of WPA for AAA is in Enterprise Mode:
Specifies 802.1x with Extensible Authentication Protocol (EAP)
Requires a RADIUS or other authentication server
Uses RADIUS protocols for authentication and key distribution
Centralizes management of user credentials
The encryption portion of WPA v1 is Temporal Key Integrity Protocol (TKIP). TKIP includes:
A per-packet key mixing function that shares a starting key between devices, and then changes their
encryption key for every packet (unicast key) or after the specified re-key time interval (broadcast
key) expires
An extended WEP key length of 256-bits
An enhanced Initialization Vector (IV) of 48 bits, instead of 24 bits, making it more difficult to
compromise
A Message Integrity Check or Code (MIC), an additional 8-byte code that is inserted before the
standard WEP 4-byte Integrity Check Value (ICV). These integrity codes are used to calculate and
compare, between sender and receiver, the value of all bits in a message, which ensures that the
message has not been tampered with.
138
Summit WM20 User Guide, Software Release 4.2

Advertisement

Table of Contents
loading

Table of Contents