Specifications

Configuring WPA
10-6 Configuring User Encryption
•AclientthatreceivesanotherframewithaninvalidMICdisassociatesfromitsaccess
pointanddoesnotsendoracceptanyframesencryptedwithTKIPorWEP.
TheAPorclientrefusestosendorreceivetrafficencryptedwithTKIPorWEPforthe
durationofthecountermeasurestimer,which
is60,000milliseconds(60seconds)by
default.Whenthecountermeasurestimerexpires,theaccesspointallowsassociationsand
reassociationsandgeneratesnewsessionkeysforthem.Youcansetthecountermeasures
timerforAPradiostoavaluefrom0to60,000milliseconds(ms).Ifyouspecify0ms,the
radios
donotusecountermeasuresbutinsteadcontinuetoacceptandforwardencrypted
trafficfollowingasecondMICfailure.However,MSSstillgeneratesanSNMPtrapto
informyouoftheMICfailure.
TheMICusedbyCCMP,CBCMAC,isevenstrongerthanMichaelanddoesnotrequireor
provide
countermeasures.WEPdoesnotuseaMIC.Instead,WEPperformsacyclicredundancy
check(CRC)ontheframeandgeneratesanintegritycheckvalue(ICV).
WPA Authentication Methods
YoucanconfigureanSSIDtosupportoneorbothofthefollowingauthenticationmethodsfor
WPAclients:
802.1X—TheAPandclientuseanExtensibleAuthenticationProtocol(EAP)methodto
authenticateoneanother,thenusethe resultingkeyinahandshaketoderiveauniquekeyfor
thesession.The802.1X
authenticationmethod requiresuserinformationtobeconfiguredon
AAAserversorintheRoamAboutSwitch’s localdatabase.Thisisthe defaultWPA
authenticationmethod.
•Presharedkey(PSK)—AnAPradioandaclientauthenticateoneanotherbasedonakeythat
isstaticallyconfiguredonbothdevices.Thedevicesthenuse
thekeyinahandshaketoderive
auniquekeyforthesession.Foragivenserviceprofile,youcangloballyconfigureaPSKfor
usewithallclients.YoucanconfigurethekeybyenteringanASCIIpassphraseorbyentering
thekeyitselfinraw(hexadecimal)form.
WPA Information Element
AWPAinformationelement(IE)isasetofextrafieldsinawirelessframethatcontainWPA
informationfortheaccesspointorclient.ToenableWPAsupportinaserviceprofile,youmust
enabletheWPAIE.ThefollowingtypesofwirelessframescancontainaWPAIE:
•Beacon
(sentbyanAP)—TheWPAIEinabeaconframeadvertisestheciphersuitesand
authenticationmethodsthatanAPradiosupportsfortheencryptedSSID.TheWPAIEalso
liststheciphersuitesthattheradiousestoencryptbroadcastandmulticastframes.AnAP
radioalwaysusestheleast
secureoftheciphersuitestoencryptbroadcastandmulticast
framestoensurethatallclientsassociatedwiththeSSIDcandecrypttheframes.AnAPradio
usesthemostsecureciphersuitesupportedbyboththeradioandaclienttoencryptunicast
traffictothatclient.
•Proberesponse
(sentbyanAPradio)—TheWPAIEinaproberesponseframeliststhesame
WPAinformationthatiscontainedinthebeaconframe.
Associationrequestorreassociation(sentbyaclient)—TheWPAIEinanassociationrequest
liststheauthenticationmethodandciphersuitetheclientwantstouse.
Notes: For a MAC client that authenticates using a PSK, the RADIUS servers or local database still
must contain an authentication rule for the client, to assign the client to a VLAN.