![Allen-Bradley 1783-WAPAK9 Скачать руководство пользователя страница 345](http://html1.mh-extra.com/html/allen-bradley/1783-wapak9/1783-wapak9_user-manual_2900827345.webp)
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
345
Configuring Cipher Suites and WEP
Chapter 11
Configuring Cipher Suites
and WEP
These sections describe how to configure cipher suites, WEP and additional
WEP features such as MIC, TKIP, and broadcast key rotation.
Creating WEP Keys
You need to configure only static WEP keys if your access point needs to support
client devices that use static WEP. If all the client devices that associate to the
access point use key management (WPA, CCKM, or 802.1x authentication) you
don’t need to configure static WEP keys.
Beginning in privileged EXEC mode, follow these steps to create a WEP key and
set the key properties:
1.
Enter global configuration mode.
configure terminal
2.
Enter interface configuration mode for the radio interface.
•
The 2.4 GHz radio and the 2.4 GHz 802.11n radio is 0.
•
The 5 GHz radio and the 5 GHz 802.11n radio is 1.
interface dot11radio { 0 | 1 }
3.
Create a WEP key and set up its properties.
•
(Optional) Select the VLAN to create a key.
•
Name the key slot where the WEP key resides.
You can assign up to four
WEP keys for each VLAN.
•
Enter the key and set the size of the key. You can use a 40-bit or 128-bit.
40-bit keys contain 10 hexadecimal digits; 128-bit keys contain 26
hexadecimal digits.
•
(Optional) Specify if the key is encrypted (
7
) or unencrypted (
0
).
•
(Optional) Set this key as the transmit key. The key in slot 1 is the
transmit key by default
encryption
[vlan vlan-id]
key 1-4
size { 40 | 128 } encryption-key
TIP
WEP, TKIP, MIC, and broadcast key rotation are disabled by default.
TIP
•
If you configure static WEP with MIC (key hash), the access point and
associated client devices must use the same WEP key as the transmit key,
and the key must be in the same key slot on the access point and the
clients.
•
Configuration of static WEP with CMIC is not supported.
•
By using security, features such as authenticated key management can
limit WEP key configurations. See
WEP Key Restrictions on page 346
for a
list of features that impact WEP keys.
Содержание 1783-WAPAK9
Страница 240: ...240 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 6 Administering the WAP Access Notes...
Страница 300: ...300 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 8 Configuring Multiple SSIDs Notes...
Страница 440: ...440 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 14 Configuring RADIUS and TACACS Servers Notes...
Страница 456: ...456 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 15 Configuring VLANs...
Страница 476: ...476 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 16 Configuring QoS Notes...
Страница 482: ...482 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 17 Configuring Filters...
Страница 489: ...Rockwell Automation Publication 1783 UM006A EN P May 2014 489 Configuring Filters Chapter 17...
Страница 520: ...520 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 19 Configuring SNMP Notes...
Страница 572: ...572 Rockwell Automation Publication 1783 UM006A EN P May 2014 Chapter 21 Troubleshooting Notes...
Страница 578: ...578 Rockwell Automation Publication 1783 UM006A EN P May 2014 Appendix A Protocol Filters Notes...
Страница 594: ...594 Rockwell Automation Publication 1783 UM006A EN P May 2014 Appendix C Error and Event Messages Notes...
Страница 600: ...600 Rockwell Automation Publication 1783 UM006A EN P May 2014 Glossary Notes...
Страница 610: ...610 Rockwell Automation Publication 1783 UM006A EN P May 2014 Index Notes...
Страница 611: ......