284
C
HAPTER
13: C
ONFIGURING
U
SER
E
NCRYPTION
Configuring WPA
Wi-Fi Protected Access (WPA) is a security enhancement to the IEEE
802.11 wireless standard. WPA provides enhanced encryption with new
cipher suites and provides per-packet message integrity checks. WPA is
based on the 802.11i standard. You can use WPA with 802.1X
authentication. If the client does not support 802.1X, you can use a
preshared key on the MAP and the client for authentication.
WPA Cipher Suites
WPA supports the following cipher suites for packet encryption, listed
from most secure to least secure:
Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol (CCMP)
— CCMP provides
Advanced Encryption Standard (AES) data encryption. To provide
message integrity, CCMP uses the Cipher Block Chaining Message
Authentication Code (CBC-MAC).
Temporal Key Integrity Protocol (TKIP)
— TKIP uses the RC4
encryption algorithm, a 128-bit encryption key, a 48-bit initialization
vector (IV), and a message integrity code (MIC) called Michael.
Wired Equivalent Privacy (WEP) with 104-bit keys
— 104-bit WEP
uses the RC4 encryption algorithm with a 104-bit key.
WEP with 40-bit keys
— 40-bit WEP uses the RC4 encryption
algorithm with a 40-bit key.
You can configure MAPs to support one or more of these cipher suites.
For all of these cipher suites, MSS dynamically generates unique session
keys for each session. MSS periodically changes the keys to reduce the
likelihood that a network intruder can intercept enough frames to
decode a key.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...