User's Guide

Table Of Contents
hwc_vnsconfiguration.fm
Configuring a VNS
Working with the VNS wizard to create a new VNS
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 283
Exception Protects access to the HiPath Wireless Controller’s own
interfaces, including the VNSs own interface. VNS exception filters
are applied to user traffic intended for the HiPath Wireless Controller's
own interface point on the VNS. These filters are applied after the
user's specific VNS state assigned filters.
Non-Authenticated – Controls network access and also used to
direct mobile users to a Captive Portal Web page for login.
14. In the Filter table, select the Allow or Deny option buttons for each filter if
applicable, and then select the Enable checkbox accordingly.
15. Click Next. The Privacy screen is displayed.
16. On the Privacy screen, do the following:
None – Select if you do not want to assign any privacy mechanism.
Static Keys – Select to configure static keys.
WEP Key Length – Click the WEP encryption key length: 64 bit, 128
bit, or 152 bit.
Select one of the following input methods:
Input Hex – If you select Input Hex, type the WEP key input in the
WEP Key box. The key is generated automatically based on the
input.
Input String – If you select Input String, type the secret WEP key
string used for encrypting and decrypting in the WEP Key String box.
The WEP Key box is automatically filled by the corresponding Hex
code.
•WPA-PSK – Select to use a Pre-Shared Key (PSK), or shared secret for
authentication. WPA-PSK (Wi-Fi Protected Access Pre-Shared key) is a
security solution that adds authentication to enhanced WEP encryption
and key management. WPA-PSK mode does not require an
authentication server. It is suitable for home or small office.
To enable WPA v1 encryption, select WPA v.1. If WPA v.1 is enabled,
click one of the following encryption types from the Encryption drop-
down list:
Auto – The AP will advertise both TKIP and CCMP (Counter Mode
with Cipher Block Chaining Message Authentication Code Protocol)
for WPAv1. CCMP is an IEEE 802.11i encryption protocol that uses
the encryption cipher AES (Advanced Encryption Standard). Auto is
the default.
TKIP only – The AP will advertise TKIP as an available encryption
protocol for WPAv1. It will not advertise CCMP.