282
C
HAPTER
13: C
ONFIGURING
U
SER
E
NCRYPTION
You can configure an SSID to support any combination of WPA, RSN, and
non-WPA clients. For example, a radio can simultaneously use Temporal
Key Integrity Protocol (TKIP) encryption for WPA clients and WEP
encryption for non-WPA clients.
The SSID type must be crypto (encrypted) for encryption to be used. If the
SSID type is clear, wireless traffic is not encrypted, regardless of the
encryption settings.
MSS does not encrypt traffic in the wired part of the network. MSS does
not encrypt wireless or wired traffic for users who associate with an
unencrypted (clear) SSID.
Table 23 lists the encryption types supported by MSS and their default
states.
Table 23
Wireless Encryption Defaults
Encryption Type
Client Support Default State
Configuration Required
in MSS
RSN
RSN clients
Non-RSN clients
Disabled
Enable the RSN
information element (IE).
Specify the supported
cipher suites (CCMP,
TKIP, 40-bit WEP,
104-bit WEP). TKIP is
enabled by default when
the RSN IE is enabled.
WPA
WPA clients
Non-WPA
clients
Disabled
Enable the WPA
information element (IE).
Specify the supported
cipher suites (CCMP,
TKIP, 40-bit WEP,
104-bit WEP). TKIP is
enabled by default when
the WPA IE is enabled.
Dynamic WEP
WEP clients
(WPA and RSN
not supported)
Enabled
None
Static WEP
WEP clients
(WPA and RSN
not supported)
Disabled
Configure the static
key(s).
Assign keys to multicast
and unicast traffic.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...