Configuring WEP
299
Configuring WEP
Wired-Equivalent Privacy (WEP) is a security protocol defined in the
802.11 standard. WEP uses the RC4 encryption algorithm to encrypt
data.
To provide integrity checking, WEP access points and clients check the
integrity of a frame’s cyclic redundancy check (CRC), generate an integrity
check value (ICV), and append the value to the frame before sending it.
The radio or client that receives the frame recalculates the ICV and
compares the result to the ICV in the frame. If the values match, the
frame is processed. If the values do not match, the frame is discarded.
WEP is either dynamic or static depending on how the encryption keys
are generated. MAPs support dynamic WEP and static WEP.
For dynamic WEP, MSS dynamically generates keys for broadcast,
multicast, and unicast traffic. MSS generates unique unicast keys for
each client session and periodically regenerates (rotates) the broadcast
and multicast keys for all clients. You can change or disable the
broadcast or multicast rekeying interval.
For static WEP, MSS uses statically configured keys typed in the WX
switch’s configuration and on the wireless client and does not rotate
the keys.
Dynamic WEP encryption is enabled by default. You can disable dynamic
WEP support by enabling WPA and leaving the WEP-40 or WEP-104
cipher suites disabled. If you use dynamic WEP, 802.1X must also be
configured on the client in addition to WEP.
Static WEP encryption is disabled by default. To enable static WEP
encryption, configure the static WEP keys and assign them to unicast and
multicast traffic. Make sure you configure the same static keys on the
clients.
To support dynamic WEP in a WPA environment, enable WPA and enable
the WEP-40 or WEP-104 cipher suite. (See “Configuring WPA” on
page 290.)
This section describes how to configure and assign static WEP keys. (To
change other key-related settings, see “Managing 802.1X Encryption
Keys” on page 533.)
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...