User's Manual
Table Of Contents
- Chapter 1: Introduction
- Chapter 2: Installation
- Chapter 3: Network Planning
- Chapter 4: Initial Configuration
- Chapter 5: System Configuration
- Appendix A: Troubleshooting
- Appendix B: Cables
- Appendix C: Specifications
- Glossary
- Index
Wireless Configuration
81
5
Figure 5-35 WPA2 PSK Security
Field Attributes
•TKIP/AES – Uses Temporal Key Integrity Protocol (TKIP) or AES keys for
encryption. WPA specifies TKIP as the data encryption method to replace WEP.
TKIP avoids the problems of WEP static keys by dynamically changing data
encryption keys. WPA/WPA2 mixed modes allow both WPA and WPA2 clients to
associate to a common SSID interface. In mixed mode, the unicast encryption
cipher (TKIP or AES-CCMP) is negotiated for each client.
•AES – Uses Advanced Encryption Standard (AES) keys for encryption. WPA2
uses AES Counter-Mode encryption with Cipher Block Chaining Message
Authentication Code (CBC-MAC) for message integrity. The AES Counter-Mode/
CBCMAC Protocol (AES-CCMP) provides extremely robust data confidentiality
using a 128-bit key. Use of AES-CCMP encryption is specified as a standard
requirement for WPA2. Before implementing WPA2 in the network, be sure client
devices are upgraded to WPA2-compliant hardware.
•PSK – Displays the pre-shared key if WPA/WPA2 has been enabled.
•EAP – IEEE 802.1X access security uses Extensible Authentication Protocol
(EAP) and requires a configured RADIUS authentication server to be accessible in
the enterprise network. If you select WPA or WPA2 Enterprise mode, be sure to
configure the RADIUS settings.
•PSK Key – Specifies a pre-shared key. (Default: none; Range: 8-63 characters)