D-Link DWS-3024 Product Manual - Page 105

TKIP and CCMP AES, WPA Key Type

Page 105 highlights

5 Configuring Access Point Settings Table 14. Static WPA Field WPA Ciphers WPA Key Type Passphrase Pre-Authentication Pre-Authentication Limit Key Forwarding Key Caching Hold Time Description Select the cipher suite you want to use: • TKIP • CCMP (AES) • TKIP and CCMP (AES) Both TKIP and AES clients can associate with the access point. WPA clients must have one of the following to be able to associate with the AP: • A valid TKIP key • A valid AES-CCMP key Select the key type by clicking one of the radio buttons: • ASCII-Includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and #. Spaces are not permitted. • Hex-Includes digits 0 to 9 and the letters A to F. The WPA Key is the shared secret key for WPA Personal. Enter a string of at least 8 characters to a maximum of 63 characters. If you select WPA/WAP2 Enterprise, you can enable Pre-Authentication. Click the Pre-Authentication check box if you want WPA2 wireless clients to send pre-authentication packets. The pre-authentication information is relayed from the access point the client is currently using to the target access point. Enabling this feature can help speed up authentication for roaming clients who connect to multiple access points. Only clients that connect by using WPA2 can use this feature. It is not supported by the original WPA. Enter the number of pre-authentications that can be in progress simultaneously on an AP. The limit prevents too much load on the RADIUS server. This does not prevent the pre-authentication from being attempted again when the load is lighter. A value of 0 represents no limit. NOTE: This field is only available if you access the network through the AP Profile or Network page under Advanced Configuration. Select the check box to allow APs to forward the Pairwise Master Key (PMK) for the wireless client to other APs in case the client roams to another AP. NOTE: This field is only available if you access the network through the AP Profile or Network page under Advanced Configuration. Enter the amount of minutes a PMK will be held by the AP. This applies to PMKs generated by RADIUS, those that come from pre-authentication, and those that are forwarded to the AP. Note that this time limit can be overridden by RADIUS if the RADIUS server returns a longer time in the Session-Timeout attribute for a particular user. The valid values of this are from 1-1440 minutes. NOTE: This field is only available if you access the network through the AP Profile or Network page under Advanced Configuration. Configuring SSID Settings 105

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

Configuring SSID Settings
105
5
Configuring Access Point Settings
WPA Ciphers
Select the cipher suite you want to use:
TKIP
CCMP (AES)
TKIP and CCMP (AES)
Both TKIP and AES clients can associate with the access point. WPA
clients must have one of the following to be able to associate with the AP:
A valid TKIP key
A valid AES-CCMP key
WPA Key Type
Select the key type by clicking one of the radio buttons:
ASCII
—Includes upper and lower case alphabetic letters, the numeric
digits, and special symbols such as @ and #. Spaces are not permitted.
Hex
—Includes digits 0 to 9 and the letters A to F.
Passphrase
The WPA Key is the shared secret key for
WPA
Personal. Enter a string of
at least 8 characters to a maximum of 63 characters.
Pre-Authentication
If you select WPA/WAP2 Enterprise, you can enable Pre-Authentication.
Click the
Pre-Authentication
check box if you want
WPA2
wireless clients
to send pre-authentication packets. The pre-authentication information is
relayed from the access point the client is currently using to the target
access point.
Enabling this feature can help speed up authentication for roaming clients
who connect to multiple access points. Only clients that connect by using
WPA2 can use this feature. It is not supported by the original
WPA
.
Pre-Authentication
Limit
Enter the number of pre-authentications that can be in progress
simultaneously on an AP. The limit prevents too much load on the RADIUS
server. This does not prevent the pre-authentication from being attempted
again when the load is lighter. A value of 0 represents no limit.
NOTE
: This field is only available if you access the network through the
AP Profile or Network page under
Advanced Configuration
.
Key Forwarding
Select the check box to allow APs to forward the Pairwise Master Key
(PMK) for the wireless client to other APs in case the client roams to
another AP.
NOTE
: This field is only available if you access the network through the
AP Profile or Network page under
Advanced Configuration
.
Key Caching Hold
Time
Enter the amount of minutes a PMK will be held by the AP. This applies to
PMKs generated by RADIUS, those that come from pre-authentication, and
those that are forwarded to the AP. Note that this time limit can be
overridden by RADIUS if the RADIUS server returns a longer time in the
Session-Timeout attribute for a particular user. The valid values of this are
from 1-1440 minutes.
NOTE
: This field is only available if you access the network through the
AP Profile or Network page under
Advanced Configuration
.
Table 14.
Static WPA
Field
Description