Defining A Wm-Ad With No Authentication - Extreme Networks Summit WM20 User Manual

Version 4.2
Hide thumbs Also See for Summit WM20:
Table of Contents

Advertisement

WM Access Domain Services Configuration
4 Select WPA.
5 To enable WPA v1 encryption, select WPA v.1.
6 From the Encryption drop-down list, select one of the following encryption types:
Auto – The AP will advertise both TKIP and CCMP (Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol) for WPAv1. CCMP is an IEEE 802.11i encryption protocol
that uses the encryption cipher AES (Advanced Encryption Standard). Auto is the default.
TKIP only – The AP will advertise TKIP as an available encryption protocol for WPAv1. It will
not advertise CCMP.
7 To enable re-keying after a time interval, select Broadcast re-key interval.
If this checkbox is not selected, the Broadcast encryption key is never changed and the Wireless AP
will always use the same broadcast key for Broadcast/Multicast transmissions. This will reduce the
level of security for wireless communications.
8 In the Broadcast re-key interval box, type the time interval after which the broadcast encryption key
is changed automatically. The default is 3600.
9 To save your changes, click Save.

Defining a WM-AD With No Authentication

You can set up a WM-AD that will bypass all authentication mechanisms and run Summit WM
Controller, Access Points and Software with no authentication of a wireless device user.
A WM-AD with no authentication can still control network access using filtering rules. For more
information on how to set up filtering rules that allow access only to specified IP addresses and ports,
see
"Defining Non-authenticated Filters" on page
140
124.
Summit WM20 User Guide, Software Release 4.2

Advertisement

Table of Contents
loading

Table of Contents