Introduction
1-13
The same device, host computer or front-end processor, usually performs both encryption and
decryption. The transmit or receive direction determines whether the encryption or decryption
function is performed. The device takes plain text, encrypts or scrambles the text typically by
mathematically combining the key with the plain text as instructed by the algorithm, then transmits
the data over the network. At the receiving end, another device takes the encrypted text and decrypts,
or unscrambles, the text revealing the original message. An unauthorized user can know the
algorithm, but cannot interpret the encrypted data without the appropriate key. Only the sender and
receiver of the transmitted data know the key.
Wired Equivalent Privacy (WEP)
is an encryption security protocol specified in the IEEE Wireless
Fidelity (Wi-Fi) standard, 802.11b and supported by the AP. WEP encryption is designed to provide a
WLAN with a level of security and privacy comparable to that of a wired LAN. The level of protection
provided by WEP encryption is determined by the encryption key length and algorithm. An encryption
key is a string of case sensitive characters used to encrypt and decrypt data packets transmitted
between a mobile unit (MU) and the access point. An access point and its associated wireless clients
must use the same encryption key (typically 1 through 4) to interoperate.
For detailed information on WEP, see
Configuring WEP Encryption on page 6-16
.
1.2.8.4 KeyGuard Encryption
Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard
negotiation takes place between the access point and MU upon association. The access point can
use KeyGuard with Motorola MUs. KeyGuard is only supported on Motorola MUs making it a
Motorola proprietary security mechanism.
For detailed information on KeyGuard configurations, see
Configuring KeyGuard Encryption on page
6-18
.
1.2.8.5 Wi-Fi Protected Access (WPA) Using TKIP Encryption
Wi-Fi Protected Access
(WPA) is a security standard for systems operating with a Wi-Fi wireless
connection. WEP’s lack of user authentication mechanisms is addressed by WPA. Compared to WEP,
WPA provides superior data encryption and user authentication.
WPA addresses the weaknesses of WEP by including:
•
a per-packet key mixing function
•
a message integrity check
•
an extended initialization vector with sequencing rules
•
a re-keying mechanism
Summary of Contents for AP-51 Series
Page 1: ...AP 51xx Access Point Product Reference Guide ...
Page 3: ...AP 51xx Access Point Product Reference Guide 72E 124688 01 May 2009 ...
Page 4: ......
Page 16: ...AP 51xx Access Point Product Reference Guide xiv ...
Page 80: ...AP 51xx Access Point Product Reference Guide 2 32 ...
Page 96: ...AP 51xx Access Point Product Reference Guide 3 16 ...
Page 158: ...AP 51xx Access Point Product Reference Guide 4 62 ...
Page 238: ...AP 51xx Access Point Product Reference Guide 5 80 ...
Page 318: ...AP 51xx Access Point Product Reference Guide 6 80 ...
Page 636: ...AP 51xx Access Point Product Reference Guide 9 22 3 Define a mesh supported WLAN ...
Page 649: ...Configuring Mesh Networking 9 35 3 Determine the Radio MAC Address and BSSID MAC Addresses ...
Page 679: ...Adaptive AP 10 25 line con 0 line vty 0 24 end ...
Page 680: ...AP 51xx Access Point Product Reference Guide 10 26 ...
Page 692: ...AP 51xx Access Point Product Reference Guide A 12 ...
Page 716: ...AP 51xx Access Point Product Reference Guide C 4 ...
Page 722: ...AP 51xx Access Point Product Reference Guide IN 10 ...
Page 723: ......