Cisco AIR-LAP1252AG-A-K9 Software Configuration Guide - Page 134

Enabling Temporal Key Integrity Protocol (TKIP

Page 134 highlights

Enabling Additional WEP Security Features Chapter 4 Security Setup Follow this link path to browse to the AP Radio Advanced page: 1. On the Summary Status page, click Setup. 2. On the Setup page, click Advanced in the AP Radio row under Network Ports for the internal radio or the radio module. Follow these steps to enable MIC: Step 1 Follow the steps in the "Setting Up WEP" section on page 4-9 to set up and enable WEP. You must set up and enable WEP with full encryption before MIC becomes active. If WEP is off or if you set it to optional, MIC is not enabled. Note If you enable MIC but you use static WEP (you do not enable any type of EAP authentication), both the access point radio and any devices with which it communicates must use the same WEP key for transmitting data. For example, if the MIC-enabled access point uses the key in slot 1 as the transmit key, a client device associated to the access point must use the same key in its slot 1, and the key in the client's slot 1 must be selected as the transmit key. Step 2 Step 3 Step 4 Step 5 Browse to the AP Radio Advanced page for the internal radio or the radio module. Select MMH from the Enhanced MIC verification for WEP pull-down menu. Make sure yes is selected for the Use Aironet Extensions setting. MIC does not work if Use Aironet Extensions is set to no. Click OK. MIC is enabled, and only client devices with MIC capability can communicate with the access point. Enabling Temporal Key Integrity Protocol (TKIP) Temporal Key Integrity Protocol (TKIP), also known as WEP key hashing, defends against an attack on WEP in which the intruder uses an unencrypted segment called the initialization vector (IV) in encrypted packets to calculate the WEP key. TKIP removes the predictability that an intruder relies on to determine the WEP key by exploiting IVs. TKIP protects both unicast and broadcast WEP keys. 4-16 Cisco Aironet 1200 Series Access Point Software Configuration Guide OL-2159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284

Chapter 4
Security Setup
Enabling Additional WEP Security Features
4-16
Cisco Aironet 1200 Series Access Point Software Configuration Guide
OL-2159-03
Follow this link path to browse to the AP Radio Advanced page:
1.
On the Summary Status page, click
Setup
.
2.
On the Setup page, click
Advanced
in the AP Radio row under Network Ports
for the internal radio or the radio module.
Follow these steps to enable MIC:
Step 1
Follow the steps in the
Setting Up WEP
section on page
4-9
to set up and enable
WEP. You must set up and enable WEP with full encryption before MIC becomes
active. If WEP is off or if you set it to optional, MIC is not enabled.
Note
If you enable MIC but you use static WEP (you do not enable any type of
EAP authentication), both the access point radio and any devices with
which it communicates must use the same WEP key for transmitting data.
For example, if the MIC-enabled access point uses the key in slot 1 as the
transmit key, a client device associated to the access point must use the
same key in its slot 1, and the key in the client
s slot 1 must be selected as
the transmit key.
Step 2
Browse to the AP Radio Advanced page for the internal radio or the radio module.
Step 3
Select
MMH
from the Enhanced MIC verification for WEP pull-down menu.
Step 4
Make sure
yes
is selected for the Use Aironet Extensions setting. MIC does not
work if Use Aironet Extensions is set to no.
Step 5
Click
OK
. MIC is enabled, and only client devices with MIC capability can
communicate with the access point.
Enabling Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP), also known as WEP key hashing,
defends against an attack on WEP in which the intruder uses an unencrypted
segment called the initialization vector (IV) in encrypted packets to calculate the
WEP key. TKIP removes the predictability that an intruder relies on to determine
the WEP key by exploiting IVs. TKIP protects both unicast and broadcast WEP
keys.