User guide
Wireless Interface Authentication Configuration
iMG/RG Software Reference Manual (Wireless)
9-20
Because on shared-key authentication the shared system passes along additional information, this authentica-
tion method exposes information that could be used by a hacker to crack the WEP key.
For better security levels use WPA or WPA2.
9.1.4.2.1 Shared Authentication and WEP Encryption @ 64bit
On CPE side, a Shared system supporting 64bit WEP encryption can be configured through the following CLI
commands list:
port wireless set Disable false
port wireless set ESSID iMG634WA-ST-172.32.2.142 (example)
802.1x authenticator set authentication local
802.1x authenticator set authentication disable
port wireless set Authentication Shared
port wireless set Encryption WEP64
port wireless set Mode64Key0 11-22-33-44-00
port wireless set Mode64Key1 55-66-77-88-00
port wireless set Mode64Key2 aa-bb-cc-dd-00
port wireless set Mode64Key3 ab-cd-ef-98-76
9.1.4.2.2 Shared Authentication and WEP Encryption @ 128bit
On CPE side, a Shared system supporting 128bit WEP encryption can be configured through the following CLI
commands list:
port wireless set Disable false
port wireless set ESSID iMG634WA-ST-172.32.2.142 (example)
802.1x authenticator set authentication local
802.1x authenticator set authentication disable
port wireless set Authentication Shared
port wireless set Encryption WEP128
port wireless set Mode128Key0 11-22-33-44-55-66-77-88-99-aa-bb-cc-dd*
port wireless set Mode128Key1 66-77-88-99-aa-bb-cc-dd-ee-ff-11-22-33*
port wireless set Mode128Key2 bb-cc-dd-ee-ff-11-22-33-44-55-66-77-88*
port wireless set Mode128Key3 10-1a-aa-a1-10-1a-aa-a1-10-1a-aa-a1-77*
*examples
9.1.4.3 WPA-PSK Authentication and TKIP Encryption
WPA (Wi-Fi Protected Access) authentication is a strong, standards-based interoperable Wi-Fi security specifi-
cation that uses Temporal Key Integrity Protocol (TKIP) as data encryption method.
On CPE side, a WPA-PSK with TKIP encryption wireless network can be configured through the following
command list: