
277
2.
Click the
icon corresponding to the target crypto type wireless service.
The page for configuring advanced settings for the crypto type wireless service appears.
Figure 276
Advanced settings for the crypto type wireless service
3.
Configure the advanced settings for the crypto type wireless service as described in
4.
Click
Apply
.
Table 102
Configuration items
Item Description
Client Max Users
Maximum number of clients of an SSID to be associated with the same radio
of the AP.
IMPORTANT:
When the number of clients of an SSID to be associated with the same radio of
the AP reaches the maximum, the SSID is automatically hidden.
PTK Life Time
Set the pairwise transient key (PTK) lifetime. A PTK is generated through a
four-way handshake.
TKIP CM Time
Set the TKIP countermeasure time.
By default, the TKIP countermeasure time is 0 seconds, that is, the TKIP
countermeasure policy is disabled.
If the TKIP countermeasure time is set to a value other than 0, the TKIP
countermeasure policy is enabled.
Message integrity check (MIC) is designed to avoid hacker tampering. It uses
the Michael algorithm and is extremely secure. When failures occur to MIC,
the data may have been tampered, and the system may be under attack. In
this case, TKIP enables the countermeasure policy to prevent hackers from
attacking. With the countermeasure policy enabled, if more than two MIC
failures occur within the specified time, the TKIP disassociates all connected
wireless clients and no new associations are allowed within the TKIP
countermeasure time.
Summary of Contents for WA2620X-AGNP
Page 106: ...93 Figure 90 Create a static MAC address entry ...
Page 126: ...113 Figure 116 Information about an IGMP snooping multicast entry ...
Page 187: ...174 Figure 174 Firefox web browser setting ...
Page 219: ...206 Figure 202 Common configuration area 6 Configure the advanced parameters ...
Page 243: ...230 Number of users Real time accounting interval in minutes 500 to 999 12 1000 15 ...
Page 278: ...265 Figure 266 Network diagram LAN Segment ...
Page 339: ...326 Figure 348 Configure the wireless card I ...
Page 340: ...327 Figure 349 Configure the wireless card II ...
Page 346: ...333 Figure 357 Configure the wireless card II ...