Specifications
Configuring WPA
RoamAbout Mobility System Software Configuration Guide 10-5
Figure 10-3 WPA Encryption with TKIP and WEP
TKIP Countermeasures
WPAaccesspointsandclientsverifytheintegrityofawirelessframereceived onthenetworkby
generatingakeyedmessageintegritycheck(MIC).TheMichaelMICusedwithTKIPprovidesa
holddownmechanismtoprotectthenetworkagainsttampering.
•IftherecalculatedMICmatchestheMICreceivedwiththeframe,
theframepassesthe
integritycheckandtheaccesspointorclientprocessestheframenormally.
•IftherecalculatedMICdoesnotmatchtheMICreceivedwiththeframe,theframefailsthe
integritycheck.ThisconditioniscalledaMICfailure.Theaccesspointorclientdiscardsthe
frameand
alsostartsa60‐secondtimer.IfanotherMICfailuredoesnotoccurwithin60
seconds,thetimerexpires.However,ifanotherMICfailureoccursbeforethetimerexpires,
thedevicetakesthefollowingactions:
•AnAPthatreceivesanotherframewithaninvalidMICendsitssessionswithallTKIP
andWEPclientsbydisassociatingfromtheclients.ThisincludesbothWPAWEPclients
andnon‐WPAWEPclients.Theaccesspointalsotemporarilyshutsdownthenetworkby
refusingallassociationorreassociationrequestsfromTKIPandWEPclients.Inaddition,
MSSgeneratesanSNMPtrapthatindicatesthe
RASportandradiothatreceivedframes
withthetwoMICfailuresaswellasthesourceanddestinationMACaddressesinthe
frames.
RoamAbout Switch
User D
TKIP
WPA
User C
Static WEP
Non-WPA
User B
Dynamic 40-bit WEP
WPA
User A
Dynamic WEP
Non-WPA
Encryption settings:
-WPA enabled: TKIP, WEP40
-Dynamic WEP enabled
-Static WEP disabled
AP
Layer 2