BelAir20E User Guide
Wi-Fi AP Security
April 2, 2012
Confidential
Document Number BDTM02201-A01 Standard
WPA, WPA2 and WPA2mixed privacy uses TKIP or AES encryption. With
WPA2mixed, the wireless client can use WPA or WPA2, and the AP accepts
them both.
The
psk
parameter specifies using a pre-shared key for authentication. When
specifying the pre-shared key, note the following:
• For
wep40
, the pre-shared key must be exactly 5 bytes.
• For
wep104
with
psk
, the pre-shared key must be exactly 13 bytes.
• For
wpa
,
wpa2
and
wpa2mixed
, the pre-shared key must be between 8 and
63 bytes long. The longer the key, the more secure the connection.
• The pre-shared key can be specified as a hexadecimal number or ASCII
string. Hexadecimal numbers must be preceded by
0X
or
0x
. ASCII strings
must not contain the following characters:
—bar (|)
—semicolon (;)
—question mark (?)
—double quotation mark (“)
The
dot1x
parameter specifies using RADIUS (EAP) authentication. You must
pre-configure a list of RADIUS servers. See
.
The
rekey
parameter allows you to specify Group Key Rekey options to
improve security. These options allow you to specify that a new group key (the
key that is used for communication between the access radio and a group of
clients) must be generated at regular intervals.
The default
rekey
setting is
no
meaning that the group key is not changed. If
rekey
is set to
n
seconds, the group key is changed after that time period. If
rekey
is set to
n
kpackets, the group key is changed after that many thousand
packets.
If
strict
is set to
yes
, the group key changes immediately when one client leaves
the network. The default is
no
. The
strict
setting applies to wpa and wpa2
encryption only.