Configuring Privacy for a WM-AD
Summit WM20 User Guide, Software Release 4.2
139
The encryption portion of WPA v2 is Advanced Encryption Standard (AES). AES includes:
●
A 128 bit key length, for the WPA2/802.11i implementation of AES
●
Four stages that make up one round. Each round is iterated 10 times.
●
A per-packet key mixing function that shares a starting key between devices, and then changes their
encryption key for every packet or after the specified re-key time interval expires.
●
The Counter-Mode/CBC-MAC Protocol (CCMP), a new mode of operation for a block cipher that
enables a single key to be used for both encryption and authentication. The two underlying modes
employed in CCM include:
●
Counter mode (CTR) that achieves data encryption
●
Cipher Block Chaining Message Authentication Code (CBC-MAC) to provide data integrity
The following is an overview of the WPA authentication and encryption process:
●
Step one
– The wireless device client associates with Wireless AP.
●
Step two
– Wireless AP blocks the client's network access while the authentication process is carried
out (the Summit WM Controller sends the authentication request to the RADIUS authentication
server).
●
Step three
– The wireless client provides credentials that are forwarded by the Summit WM
Controller to the authentication server.
●
Step four
– If the wireless device client is not authenticated, the wireless client stays blocked from
network access.
●
Step five
– If the wireless device client is authenticated, the Summit WM Controller distributes
encryption keys to the Wireless AP and the wireless client.
●
Step six
– The wireless device client gains network access via the Wireless AP, sending and
receiving encrypted data. The traffic is controlled with permissions and policy applied by the
Summit WM Controller.
To set up Wi-Fi Protected Access privacy (WPA) for an AAA WM-AD:
1
From the main menu, click
WM-AD Configuration
. The
WM-AD Configuration
screen is
displayed.
2
In the left pane
WM Access Domains
list, click the AAA WM-AD you want to configure privacy by
WPA-PSK for a Captive Portal. The
Topology
tab is displayed.
3
Click the
Privacy
tab.
Содержание Summit WM20
Страница 8: ...Table of Contents Summit WM20 User Guide Software Release 4 2 8 ...
Страница 20: ...About this Guide Summit WM20 User Guide Software Release 4 2 20 ...
Страница 54: ...Configuring the Summit WM Controller Summit WM20 User Guide Software Release 4 2 54 ...
Страница 96: ...WM Access Domain Services Summit WM20 User Guide Software Release 4 2 96 ...
Страница 150: ...WM Access Domain Services Configuration Summit WM20 User Guide Software Release 4 2 150 ...
Страница 168: ...Availability and Controller Functionality Summit WM20 User Guide Software Release 4 2 168 ...
Страница 172: ...Working With Third Party APs Summit WM20 User Guide Software Release 4 2 172 ...
Страница 184: ...Working With the Summit WM Series Spy Summit WM20 User Guide Software Release 4 2 184 ...
Страница 194: ...Working With Reports and Displays Summit WM20 User Guide Software Release 4 2 194 ...
Страница 216: ...Performing System Maintenance Summit WM20 User Guide Software Release 4 2 216 ...