7-9
Wireless Security Configuration
Wireless Security Overview
Counter Mode/CBC-MAC Protocol (CCMP)
CCMP is an encryption method for IEEE 802.11i that uses the Advanced
Encryption Standard (AES) combined with Cipher Block Chaining Counter
mode (CBC-CTR) and Cipher Block Chaining Message Authentication Code
(CBC-MAC) for encryption and message integrity.
AES is a symmetric 128-bit block data encryption technique that works on
multiple layers of the network. It is the most effective encryption system
currently available for wireless networks.
It is possible to use a mixed cipher mode of TKIP and CCMP on a WLAN in
the AP 530.
Key Management
Keys for encrypting the data can be managed either dynamically using 802.1X
authentication or statically using preshared keys between the access point
and station. Dynamic key management provides significantly better security
than static keys.
Security Profiles
Based on authentication, encryption and key management, the following is a
list of security profiles in order of increasing robustness:
■
No Security
■
Static WEP
■
Dynamic WEP
■
TKIP with PSK
■
AES with PSK
■
TKIP with 802.1X
■
AES with 802.1X
No Security
The No Security mode transmits data over the wireless connection without
any form of encryption for data privacy. This mode may be appropriate for
systems that provide simple internet and printer access, such as on a guest
network. It may also be appropriate where additional security is provided by
the use of encrypted VPN tunnels between the wireless client device and a
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......