Wireless Interface Commands
7-111
• AES has been designated by the National Institute of
Standards and Technology as the successor to the Data
Encryption Standard (DES) encryption algorithm, and will
be used by the U.S. government for encrypting all sensitive,
nonclassified information. Because of its strength, and
resistance to attack, AES is also being incorporated as part
of the 802.11 standard.
• The WEP settings must be the same on all bridges in your
wireless network.
• The WEP encryption length specified in the
encryption
command and the
key
command must match.
• The AES keys must match for each wireless bridge link pair.
• The AES key type value entered using the
key
command
must be the same as the type specified in the
encryption
command.
• Note that encryption protects data transmitted between
wireless nodes, but does not protect any transmissions over
your wired network or over the Internet.
Example
Related Commands
key (page 7-112)
AP(if-wireless a)#encryption wep 128
AP(if-wireless a)#
Summary of Contents for 2888W-M
Page 22: ...TABLE OF CONTENTS xx ...
Page 36: ...Introduction 1 14 ...
Page 44: ...Network Configuration 2 8 ...
Page 64: ...Hardware Installation 4 12 ...
Page 76: ...Initial Configuration 5 12 ...
Page 169: ...Status Information 6 93 ...
Page 170: ...System Configuration 6 94 ...
Page 296: ...Command Line Interface 7 126 ...
Page 304: ...Specifications B 6 ...
Page 310: ...Cables and Pinouts C 6 ...
Page 316: ...Glossary Glossary 6 ...
Page 321: ......
Page 322: ...SMC2888W S SMC2888W M ...