
C
HAPTER
27
| Wireless Security Commands
– 214 –
encryption cipher suite is set to TKIP, the unicast encryption cipher
(TKIP or AES-CCMP) is negotiated for each client. The access point
advertises it’s supported encryption ciphers in beacon frames and
probe responses. WPA and WPA2 clients select the cipher they support
and return the choice in the association request to the access point. For
mixed-mode operation, the cipher used for broadcast frames is always
TKIP. WEP encryption is not allowed.
E
XAMPLE
AP(if-wireless 0: VAP[0])# auth wpa-psk
AP(if-wireless 0: VAP[0])#
R
ELATED
C
OMMANDS
encryption
key
encryption
This command enables data encryption for wireless communications. Use
the
no
form to disable data encryption.
S
YNTAX
[
no
]
encryption
D
EFAULT
S
ETTING
disabled
C
OMMAND
M
ODE
Interface Configuration (Wireless-VAP)
C
OMMAND
U
SAGE
◆
Selecting a security method using the
auth
command, automatically
enables data encryption (WEP, TKIP, or AES-CCMP) for the VAP. Only
use this command when using WEP encryption with an Open System.
◆
Encryption is implemented in this device to prevent unauthorized
access to your wireless network. For more secure data transmissions,
enable encryption by selecting a security method using the
auth
command, or by using the
encryption
command when using WEP
encryption only.
◆
The encryption settings must be the same on each client in your
wireless network.
◆
Note that encryption protects data transmitted between wireless nodes,
but does not protect any transmissions over your wired network or over
the Internet.
Summary of Contents for EAP8518
Page 1: ...User Guide www edge core com EAP8518 802 11n Access Point...
Page 2: ...USER GUIDE EAP8518 IEEE 802 11n Access Point EAP8518 E092009 DT R01 149100000037A...
Page 19: ...TABLES 19 Table 32 1000BASE T MDI and MDI X Port Pinouts 253 Table 33 Console Port Pinouts 254...
Page 20: ...TABLES 20...
Page 23: ...INDEX OF CLI COMMANDS 23...
Page 107: ...CHAPTER 10 Status Information Event Logs 107...
Page 109: ...SECTION Command Line Interface 109 VLAN Commands on page 226 WMM Commands on page 229...
Page 145: ...CHAPTER 16 DHCP Relay Commands 145 RELATED COMMANDS show interface wireless...
Page 233: ...CHAPTER 30 WMM Commands 233...