User's Guide

Table Of Contents
hwc_vnsconfiguration.fm
Configuring a VNS
Configuring WLAN Services
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 315
•Step five – If the wireless device client is authenticated, the HiPath Wireless
Controller distributes encryption keys to the Wireless AP and the wireless
client.
•Step six – The wireless device client gains network access via the Wireless
AP, sending and receiving encrypted data. The traffic is controlled with
permissions and policy applied by the HiPath Wireless Controller.
6.9.2.2 Wireless 802.11n APs and WPA authentication
Note: If you configure a WLAN Service to use either WEP or TKIP authentication,
any Wireless 802.11n AP associated to a VNS using that service will be limited to
legacy AP performance rates.
If a VNS is configured to use WPA authentication, any Wireless 802.11n AP within
that VNS will do the following:
WPA v.1 – If WPA v.1 is enabled, the Wireless 802.11n AP will advertise only
TKIP as an available encryption protocol.
WPA v.2 – If WPA v.2 is enabled, the Wireless 802.11n AP will do the
following:
If WPA v.1 is enabled, the Wireless 802.11n AP will advertise TKIP as an
available encryption protocol.
Note: If WPA v.2 is enabled, the Wireless 802.11n AP does not support the
Auto option.
If WPA v.1 is disabled, the Wireless 802.11n AP will advertise the
encryption cipher AES (Advanced Encryption Standard).
Note: The security encryption for some network cards must not to be set to
WEP or TKIP to achieve a data rate beyond 54 Mbps.
6.9.2.3 WPA Key Management Options
Wi-Fi Protected Access (WPA v1 and WPA v2) Privacy offers you the following
key management options:
None
Opportunistic Keying