D-Link DWL-8600AP Administration Guide - Page 52

Ieee 802.1x

Page 52 highlights

D-Link UAP Field Authentication Software User Manual 12/10/09 Table 16: Static WEP (Cont.) Description The authentication algorithm defines the method used to determine whether a client station is allowed to associate with an AP when static WEP is the security mode. Specify the authentication algorithm you want to use by choosing one of the following options: • Open System authentication allows any client station to associate with the AP whether that client station has the correct WEP key or not. This algorithm is also used in plaintext, IEEE 802.1X, and WPA modes. When the authentication algorithm is set to Open System, any client can associate with the AP. Note: Just because a client station is allowed to associate does not ensure it can exchange traffic with an AP. A station must have the correct WEP key to be able to successfully access and decrypt data from an AP, and to transmit readable data to the AP. • Shared Key authentication requires the client station to have the correct WEP key in order to associate with the AP. When the authentication algorithm is set to Shared Key, a station with an incorrect WEP key will not be able to associate with the AP. • Both Open System and Shared Key. When you select both authentication algorithms: - Client stations configured to use WEP in shared key mode must have a valid WEP key in order to associate with the AP. - Client stations configured to use WEP as an open system (shared key mode not enabled) will be able to associate with the AP even if they do not have the correct WEP key. Static WEP Rules If you use Static WEP, the following rules apply: • All client stations must have the Wireless LAN (WLAN) security set to WEP, and all clients must have one of the WEP keys specified on the AP in order to de-code AP-to-station data transmissions. • The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station transmissions. • The same key must occupy the same slot on all nodes (AP and clients). For example if the AP defines abc123 key as WEP key 3, then the client stations must define that same string as WEP key 3. • Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but this is less secure because it means one station can decrypt the data being sent by another.) • On some wireless client software, you can configure multiple WEP keys and define a client station "transfer key index", and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs cannot decode each other's transmissions. • You cannot mix 64-bit and 128-bit WEP keys between the access point and its client stations. IEEE 802.1X IEEE 802.1X is the standard defining port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically-generated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame. This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server capable of EAP, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must support Protected EAP (PEAP) and MSCHAP V2. Page 52 Virtual Access Point Settings 34CSFP6XXUAP-SWUM100-D13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135

D-Link UAP
Software User Manual
12/10/09
Page
52
Virtual Access Point Settings
34CSFP6XXUAP-SWUM100-D13
Static WEP Rules
If you use Static WEP, the following rules apply:
All client stations must have the Wireless LAN (WLAN) security set to WEP, and all clients must have one of the WEP
keys specified on the AP in order to de-code AP-to-station data transmissions.
The AP must have all keys used by clients for station-to-AP transmit so that it can de-code the station transmissions.
The same key must occupy the same slot on all nodes (AP and clients). For example if the AP defines
abc123
key as
WEP key 3, then the client stations must define that same string as WEP key 3.
Client stations can use different keys to transmit data to the access point. (Or they can all use the same key, but this is
less secure because it means one station can decrypt the data being sent by another.)
On some wireless client software, you can configure multiple WEP keys and define a client station “transfer key index”,
and then set the stations to encrypt the data they transmit using different keys. This ensures that neighboring APs
cannot decode each other’s transmissions.
You cannot mix 64-bit and 128-bit WEP keys between the access point and its client stations.
IEEE 802.1X
IEEE 802.1X
is the standard defining port-based authentication and infrastructure for doing key management. Extensible
Authentication Protocol (
EAP
) messages sent over an
IEEE 802.11
wireless network using a protocol called EAP
Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically-generated keys that are periodically refreshed. An
RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users. The AP requires a RADIUS server capable
of
EAP
, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must
support Protected EAP (PEAP) and
MSCHAP V2
.
Authentication
The authentication algorithm defines the method used to determine whether a client station is
allowed to associate with an AP when static WEP is the security mode.
Specify the authentication algorithm you want to use by choosing one of the following options:
Open System
authentication allows any client station to associate with the AP whether that client
station has the correct WEP key or not. This algorithm is also used in plaintext, IEEE 802.1X, and
WPA modes. When the authentication algorithm is set to Open System, any client can associate
with the AP.
Note:
Just because a client station is allowed to
associate
does not ensure it can exchange traffic
with an AP. A station must have the correct WEP key to be able to successfully access and decrypt
data from an AP, and to transmit readable data to the AP.
Shared Key
authentication requires the client station to have the correct WEP key in order to
associate with the AP. When the authentication algorithm is set to Shared Key, a station with an
incorrect WEP key will not be able to associate with the AP.
Both
Open System and Shared Key
. When you select both authentication algorithms:
-
Client stations configured to use WEP in shared key mode must have a valid WEP key in order
to associate with the AP.
-
Client stations configured to use WEP as an open system (shared key mode not enabled) will
be able to associate with the AP even if they do not have the correct WEP key.
Table 16:
Static WEP (Cont.)
Field
Description