![3Com OfficeConnect WX1200 Command Reference Manual Download Page 380](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270380.webp)
380
C
HAPTER
11: M
ANAGED
A
CCESS
P
OINT
C
OMMANDS
See Also
set service-profile cipher-ccmp
on page 377
set service-profile cipher-tkip
on page 378
set service-profile cipher-wep40
on page 380
set service-profile wep key-index
on page 390
set service-profile wpa-ie
on page 391
set service-profile
cipher-wep40
Enables dynamic Wired Equivalent Privacy (WEP) with 40-bit keys, in a
service profile.
Syntax
—
set service-profile
name
cipher-wep40
{
enable
|
disable
}
name
— Service profile name.
enable
—
Enables 40-bit WEP encryption for WPA clients.
disable
—
Disables 40-bit WEP encryption for WPA clients.
Defaults
— 40-bit WEP encryption is disabled by default.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— To use 40-bit WEP with WPA clients, you must also enable the
WPA IE.
When 40-bit WEP in WPA is enabled in the service profile, radios
managed by a radio profile that is mapped to the service profile can also
support non-WPA clients that use dynamic WEP.
To support WPA clients that use 104-bit dynamic WEP, you must enable
WEP with 104-bit keys in the service profile. Use the
set service-profile
cipher-wep104
command.
Microsoft Windows XP does not support WEP with WPA. To configure a
service profile to provide dynamic WEP for XP clients, leave WPA disabled
and use the
set service-profile wep
commands.
To support non-WPA clients that use static WEP, you must configure
static WEP keys. Use the
set service-profile wep key-index
command.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...