Wep Key Management; Wep Encryption With The Temporal Key Integrity Protocol (Tkip) - Avaya W310 User Manual

Wlan
Hide thumbs Also See for W310:
Table of Contents

Advertisement

When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and
both devices must be configured to use Encryption in order to communicate. If one device is
configured to use Encryption but a second device is not, then the two devices will not
communicate, even if both devices have the same Encryption Keys.
For this IEEE
standard:
802.11b
802.11a or 802.11b/g

WEP Key Management

You can assign one key for downstream traffoc amd one key for upstream traffic.

WEP Encryption with the Temporal Key Integrity Protocol (TKIP)

WEP encryption with the Temporal Key Integrity Protocol (TKIP) uses a process that starts
with a 128-bit "temporal key" shared among clients and access points. TKIP combines the
temporal key with the client's MAC address and then adds a relatively large 16-octet
initialization vector to produce the key that will encrypt the data. This procedure ensures that
each station uses different key streams to encrypt the data.
TKIP changes temporal keys every 10,000 packets. This provides a dynamic distribution
method that significantly enhances the security of the network.
Avaya W310 User's Guide
The type of WEP encryption supported includes:
64-bit and 128-bit encryption:
For 64-bit encryption, an encryption key is 5 ASCII
characters.
For 128-bit encryption, an encryption key is 3 ASCII
characters.
64-bit, 128-bit, and 152-bit encryption:
For 64-bit encryption, an encryption key is 5 ASCII
characters.
For 128-bit encryption, an encryption key is 13
ASCII characters.
For 152-bit encryption, an encryption key is 16
ASCII characters.
Note: 64-bit encryption is sometimes referred to as 40-bit encryption;
128-bit encryption is sometimes referred to as 104-bit encryption.
Chapter 12
W310 WLAN Gateway Wireless Features
177

Advertisement

Table of Contents
loading

Table of Contents