7-27
Wireless Security Configuration
Manual Configuration Using the CLI
Using the CLI to Configure Static WEP Shared Keys.
The following
example shows how to configure an SSID interface to use static WEP keys for
authentication and encryption. These commands enable security and estab-
lish the transfer key index (set to 4).
The following commands set the WEP key to an ASCII type and set the key
length.
N o t e
Using the [no] version of the
wep-key-ascii
command sets the key type to
Hex.
You can set the
wep-key-length
to 64 or 128.
The following commands set the actual key values for the WEP keys.
N o t e
The number of characters required for each WEP key depends on the Key
Length and Key Type settings:
■
If Key Length is 64 bits and the Key Type is “ASCII”, then each WEP key
must be 5 characters long.
■
If Key Length is 40 bits and Key Type is “Hex”, then each WEP key must
be 10 characters long.
■
If Key Length is 128 bits and Key Type is “ASCII”, then each WEP key must
be 13 characters long.
■
If Key Length is 128 bits and Key Type is “Hex”, then each WEP key must
be 26 characters long.
ProCurve Access Point 530# configure
ProCurve Access Point 530(config)# radio 1
ProCurve Access Point 530(radio1)# wlan 1
ProCurve Access Point 530(radio1-wlan1)#security static-wep
ProCurve Access Point 530(radio1-wlan1)#wep-default-key 4
ProCurve Access Point 530(radio1-wlan1)#
ProCurve Access Point 530(radio1-wlan1)#wep-key-ascii
ProCurve Access Point 530(radio1-wlan1)#wep-key-length 64
ProCurve Access Point 530(radio1-wlan1)#wep-key-4 pqrst
ProCurve Access Point 530(radio1-wlan1)#
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......