
7-10
Wireless Security Configuration
Wireless Security Overview
network VPN server. If this mode is used, it may be desirable to prevent
advertising availability of the network to other stations by configuring the
WLAN for closed-system operation.
C a u t i o n
Use the No Security mode on a sensitive internal network only for initial setup,
testing, or problem solving, or where VPN connections are mandated to
provide end-to-end security for the otherwise insecure wireless connection.
Static Wired Equivalent Privacy (WEP)
Static Wired Equivalent Privacy (WEP) uses shared keys (fixed-length hexa-
decimal or alphanumeric strings) that are manually distributed to all stations
that want to use the network. WEP keys are indexed in different slots (up to
four on each WLAN) and the client stations must have the same key indexed
in the same slot to access data on the access point. Shared mode 802.11
authentication is not recommended, because it sends encryption keys that are
viewable in plain text.
Dynamic Wired Equivalent Privacy (WEP)
Dynamic WEP uses WEP as the encryption cipher and 802.1X as the authen-
tication mechanism. In this way, each client station is assigned a unique
encryption key (for each session) from the authentication server. The length
of the cipher can be 64 bits or 128 bits, and the encryption keys can be
automatically and periodically changed to further reduce the risk of their
discovery.
TKIP with Preshared Key
The TKIP with Preshared Key security profile uses TKIP as the encryption
cipher and preshared key between the access point and station as the master
key and authentication mechanism. The encryption keys used between the
access point and the stations are derived from the same master key.
AES
with Preshared Key
The AES with Preshared Key security profile uses AES as the encryption
cipher and preshared key between the access point and station as the master
key and authentication mechanism. The encryption keys used between the
access point and the stations are derived from same master key.
Summary of Contents for 530 - Notebook PC
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 152: ...5 68 General System Configuration Managing Group Configuration ...
Page 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 477: ...A 1 A File Uploads Downloads and Resets ...
Page 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Page 499: ...B 1 B Defaults ...
Page 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Page 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 523: ...D 1 D Open Source Licenses ...
Page 556: ...D 34 Open Source Licenses ...
Page 561: ......