496
C
HAPTER
21: C
ONFIGURING
AAA
FOR
N
ETWORK
U
SERS
Assigning Encryption
Types to Wireless
Users
When a user turns on a wireless laptop or PDA, the device attempts to
find an access point and form an association with it. Because MAPs
support the encryption of wireless traffic, clients can choose an
encryption type to use. You can configure MAPs to use the encryption
algorithms supported by the Wi-Fi Protected Access (WPA) security
enhancement to the IEEE 802.11 wireless standard. (For details, see
Chapter 13, “Configuring User Encryption,” on page 281.)
If you have configured MAPs to use specific encryption algorithms, you
can enforce the type of encryption a user or group must have to access
the network. When you assign the Encryption-Type attribute to a user or
group, the encryption type or types are entered as an authorization
attribute into the user or group record in the local WX database or on the
RADIUS server. Encryption-Type is a 3Com vendor-specific attribute
(VSA).
Clients who attempt to use an unauthorized encryption method are
rejected.
Assigning and Clearing Encryption Types Locally
To restrict wireless uses or groups with user profiles in the local WX
database to particular encryption algorithms for accessing the network,
use one of the following commands:
set user
username
attr
encryption-type
value
set usergroup
groupname
attr encryption-type
value
set mac-user
username
attr encryption-type
value
set mac-usergroup
groupname
attr
encryption-type
value
MSS supports the values for Encryption-Type shown in Table 45. The
values are listed from most secure to least secure. (For user encryption
details, see Chapter 13, “Configuring User Encryption,” on page 281.)
Table 45
Encryption Type Values and Associated Algorithms
Encryption-Type
Value
Encryption Algorithm
Assigned
1
Advanced Encryption Standard using Counter with Cipher
Block Chaining Message Authentication Code (CBC-MAC) —
or AES_CCM.
2
Reserved.
4
Temporal Key Integrity Protocol (TKIP).
Содержание 3CRWX120695A
Страница 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Страница 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Страница 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Страница 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Страница 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Страница 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Страница 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Страница 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Страница 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Страница 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Страница 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Страница 706: ...706 GLOSSARY ...