![HP a-msr Configuration Manual Download Page 36](http://html.mh-extra.com/html/hp/a-msr/a-msr_configuration-manual_163018036.webp)
32
To do…
Use the command…
Remarks
Enter system view
system-view
—
1.
Enter WLAN service
template view.
wlan service-template
service-template-number
crypto
—
2.
Configure the PTK lifetime.
ptk-lifetime
time
Optional.
By default, the PTK lifetime is
43,200 seconds.
Configuring the GTK rekey method
A fat AP generates a GTK and sends the GTK to a client during the authentication process between an AP
and the client through group key handshake or the 4-way handshake. The client uses the GTK to decrypt
broadcast and multicast packets. RSN negotiates the GTK through the 4-way handshake or group key
handshake, and WPA negotiates the GTK only through group key handshake.
Two GTK rekey methods can be configured:
Time-based GTK rekey: After the specified interval elapses, GTK rekey occurs.
Packet-based GTK rekey. After the specified number of packets is sent, GTK rekey occurs.
You can also configure the device to start GTK rekey when a client goes offline.
Configuring GTK rekey based on time
To configure GTK rekey based on time:
To do…
Use the command…
Remarks
1.
Enter system view.
system-view
—
2.
Enter WLAN service
template view.
wlan service-template
service-template-number
crypto
—
3.
Enable GTK rekey.
gtk-rekey enable
Required.
By default, GTK rekey is
enabled.
4.
Configure the GTK rekey
interval.
gtk-rekey method
time-based
[
time
]
Required.
By default, the interval is 86,400
seconds.
5.
Configure the device to start
GTK rekey when a client goes
offline.
gtk-rekey client-offline enable
Optional.
Not configured by default.
This command takes effect only
when GTK rekey has been
enabled with the gtk-rekey
enable command.
Configuring GTK rekey based on packet
To configure GTK rekey based on packet:
To do…
Use the command…
Remarks
1.
Enter system view.
system-view
—