User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
114
Select the encryption algorithm that the Mesh Point will allow
Secure Clients and other Fortress controller to use with
set
crypto
:
# set crypto -e AES128|AES192|AES256
For information on setting encryption algorithms on Secure
Clients, refer to the Fortress Secure Client User Guide.
The default encryption algorithm is AES256.
You must be logged on to an
administrator
-level account to
change configuration settings (refer to Section 2.2).
4.1.4 Encrypted Data Compression
View the encrypted data compression setting (among other
security settings) in effect on the Mesh Point with
show crypto
(shown in Section 4.1).
Data compression on the Mesh Point is configured with
set
crypto:
# set crypto -comp on|off
Compression is turned on by default.
All Mesh Points in a given network must be configured to use
the same encrypted data compression setting, in order for
them to be able to communicate.
The Mesh Point CLI returns
OK
when settings are successfully
changed.
NOTE: Separate
multicast and
broadcast packets are
sent for each config-
ured key group. To
maximize wireless
throughput, limit the
number you select.
4.1.5 MSP Key Establishment
Select the method of key establishment the Mesh Point will
allow Secure Clients and other Fortress devices to use with
set crypto, as follows:
# set crypto -dh 512|1024|2048|suiteB
You can specify any of three supported Diffie-Hellman groups
(DH-2048 is the default selection). When operating the Mesh
Point in FIPS mode (Section 4.1.2), you cannot use DH-512
or DH-1024 key establishment, because the smaller Diffie-
Hellman group moduli are no longer compliant with FIPS 140-2
Security Level 2.
NOTE: DH-512 key
establishment can-
not be selected when a
32-digit Access ID (Sec-
tion 4.1.16) is used.
When it has been licensed on the Mesh Point (Section 5.6),
you can also select the NSA (National Security Agency) Suite
B-compliant elliptic curve Diffie-Hellman key establishment.
The
set crypto -dh command is not additive; it overwrites
existing settings.