User's Manual
Advanced Configuration
Tabulated below is the table which explains the method to create a new Security Profile:
Parameter Description
Profile Name A name to uniquely identify a security profile name.
Encryption Type Select encryption type as either None, WEP, TKIP or AES-CCM.
1. None - If the encryption type is selected as None, then there exist no security to the
data frames transmitted over the wireless medium.
2. WEP (Wired Equivalent Privacy) - Represents the WEP Encryption type, which
uses RC4 stream cipher for confidentiality and CRC-32 for integrity. The supported
key lengths for WEP are 5/13/16 ASCII Characters or 10/26/32 Hexadecimal digits.
- Key1 / Key 2 / Key 3 / key 4: You can configure a maximum of four WEP keys.
Enter 5/13/16 ASCII Characters or 10/26/32 Hexadecimal digits for WEP keys.
- Transmit Key: Select one out of the four keys described above as the default
transmit key, which is used for encrypting and transmitting the data.
3. TKIP - Represents the TKIP Encryption type, which uses RC4 stream cipher for
confidentiality. TKIP provides per-packet key mixing, a message integrity check and a
re-keying mechanism. It uses 128-bit keys for encryption. The key length for TKIP is 16
ASCII characters or 32 Hexadecimal digits.
- Key1 / Key 2 / Key 3 / key 4: You can configure a maximum of four TKIP keys.
Enter 16 ASCII Characters or 32 Hexadecimal digits.
- Transmit Key: Select one out of the four keys described above as the default
transmit key, which is used for encrypting and transmitting the data.
4. AES-CCM - Represents CCM Protocol with AES Cipher restricted to 128 bits.
• Key: Enter 16 ASCII Characters or 32 Hex Digits for AES-CCM encryption keys.
Entry status Enables a user to either Enable or Disable the security profile on the device. By default, it
is enabled.
Network Secret Enter the WORP Protocol Secret Key, ranging from 6 to 32 characters, used for
authenticating a SU with a BSU, and an End Point B with End Point A. The network secret
should be same for a BSU and SU. Similarly, the network secret should be same for an End Point
A and an End Point B.
:
• A maximum of 8 security profiles can be created.
• A Quick Bridge support AES-CCM encryption type only.
• Special characters like - = \ " ' ? / space are not allowed while configuring the keys.
• All four Keys (Key1, Key2, Key3, Key4) must be of same length and same type, that is, all four Keys must
be either ASCII Characters or Hexadecimal digits.
• Transmit Key can be any one of the four keys, provided all the four keys are same in a SU and BSU, or End
Point devices.
• WEP and TKIP Encryption Types are supported only in legacy Modes.
• The encryption mode should not be selected as AES-CCM while the device is interoperating with legacy
Tsunami® MP.11 family devices which include 954-R, 2454-R, 4954-R, 5054-Series, and 5012-Series.
After configuring the required parameters, click Add and then COMMIT.
Tsunami® 8100 Series - Software Management Guide 70