Cisco AP541N-A-K9 Administration Guide - Page 72

Wireless, Table 14, Dynamic WEP, Field, Description

Page 72 highlights

4 69 Wireless Modifying Virtual Access Point Settings Dynamic WEP Dynamic WEP mode uses IEEE 802.1X, the standard defining port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless network by using a protocol called EAP Encapsulation Over LANs (EAPOL). Dynamic WEP mode provides dynamically-generated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame. This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server capable of EAP, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must support Protected EAP (PEAP) and MSCHAP V2. You can use any of a variety of authentication methods that the Dynamic WEP mode supports, including certificates, Kerberos, and public key authentication. You must configure the client stations to use the same authentication method the access point uses. Table 14 Dynamic WEP Field Use Global RADIUS Server Settings Description By default each VAP uses the global RADIUS settings that you define for the AP at the top of the VAP page. However, you can configure each VAP to use a different set of RADIUS servers. To use the global RADIUS server settings, make sure the check box is selected. RADIUS IP Address RADIUS IP Address 1-3 To use a separate RADIUS server for the VAP, clear the check box and enter the RADIUS server IP address and key in the following fields. Enter the address for the primary RADIUS server for this VAP. Enter up to three IPv4 addresses to use as the backup RADIUS servers for this VAP. If authentication fails with the primary server, each configured backup server is tried in sequence. Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Wireless
Modifying Virtual Access Point Settings
69
Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
4
Dynamic WEP
Dynamic WEP mode uses IEEE 802.1X, the standard defining port-based
authentication and infrastructure for doing key management. Extensible
Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless
network by using a protocol called EAP Encapsulation Over LANs (EAPOL).
Dynamic WEP mode provides dynamically-generated keys that are periodically
refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic
redundancy checking (CRC) of each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users.
The AP requires a RADIUS server capable of EAP, such as the Microsoft Internet
Authentication Server. To work with Windows clients, the authentication server
must support Protected EAP (PEAP) and MSCHAP V2.
You can use any of a variety of authentication methods that the Dynamic WEP
mode supports, including certificates, Kerberos, and public key authentication.
You must configure the client stations to use the same authentication method the
access point uses.
Table 14
Dynamic WEP
Field
Description
Use Global
RADIUS Server
Settings
By default each VAP uses the global RADIUS settings that
you define for the AP at the top of the VAP page. However,
you can configure each VAP to use a different set of RADIUS
servers.
To use the global RADIUS server settings, make sure the
check box is selected.
To use a separate RADIUS server for the VAP, clear the check
box and enter the RADIUS server IP address and key in the
following fields.
RADIUS IP
Address
Enter the address for the primary RADIUS server for this VAP.
RADIUS IP
Address 1–3
Enter up to three IPv4 addresses to use as the backup
RADIUS servers for this VAP.
If authentication fails with the primary server, each
configured backup server is tried in sequence.