Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 57

Delay between EAP-Success and WPA2 Unicast Key Exchange, EAP-TLS, Protected EAP PEAP

Page 57 highlights

Table 9 Profiles > AAA > 802.1x Auth Profile Settings (Continued) Field Default Description Multicast Key Rotation 1800 Time Interval (60-86400 sec) Unicast Key Rotation 900 Time Interval (60-864000 sec) Authentication Server 30 Retry Interval (5-65535 sec) Authentication Server 2 Retry Count (0-3) Framed MTU 1100 (500-1500) Number of Times ID- 3 Requests are Retried (1-10) Maximum Number of 3 Reauthentication Attempts (1-10) Maximum Number of 0 Times Held State Can Be Bypassed (0-3) Dynamic WEP Key 1 Message Retry Count (1-3) Dynamic WEP Key Size 128 (bits) Interval Between WPA/ 1000 WPA2 Key Messages (10-5000 msec) Display Between EAP- 0 Success and WPA2 Unicast Key Exchange (0-2000 msec) Delay between WPA/ 0 WPA2 Unicast Key Exchange (0-2000 msec) WPA/WPA2 Key 3 Message Retry Count (1-10) Multicast Key Rotation No When enabled, unicast and multicast keys are updated after each reauthorization. It is a best practice to configure the time intervals for reauthentication, multicast key rotation, and unicast key rotation to be at least 15 minutes. Make sure these intervals are mutually prime, and the factor of the unicast key rotation interval and the multicast key rotation interval is less than the reauthentication interval. Specify the interface at which reauthentication is supported. The supported range is from 1 to 6,535 seconds. Define the number of times that failed authentication should be allowed to retry authentication. Define the size, in bytes, for framed maximum transmission units. Define the number of allowable times that failed ID requests are allowed to retry the request. Set the number of times that reauthentication is to be attempted if the first authentication attempt fails. Define whether a held state can be bypassed, and the number of times this is to be allowed. Define the number of times that failed authentication with a WEP key should be allowed to retry authentication. The range is from 0 to 3 attempts. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and searching for such weak implementations that are still used by many legacy devices. Specify the maximum size of the WEP key in bits. The options are 40 or 128. Specify the key message interval in milliseconds. Full field name is Delay between EAP-Success and WPA2 Unicast Key Exchange. Define EAP for RADIUS server authentication. 802.1x uses the Extensible Authentication Protocol (EAP) to exchange messages during the authentication process. The authentication protocols that operate inside the 802.1x framework that are suitable for wireless networks include EAP-Transport Layer Security (EAP-TLS), Protected EAP (PEAP), and EAP-Tunneled TLS (EAP-TTLS). These protocols allow the network to authenticate the client while also allowing the client to authenticate the network. Specify the delay between processing these two key times during authentication. Specify the number of times that WPA or WPA2 keys are allowed to retry. The supported range is from 1 to 10. Enable or disable multicast key rotation, and define the related settings on this page for multicast key rotation time and interval if this field is enabled. Dell PowerConnect W AirWave 7.2 | Configuration Guide Dell PowerConnect W Configuration Reference | 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

Dell PowerConnect W AirWave 7.2
| Configuration Guide
Dell PowerConnect W Configuration Reference
|
57
Multicast Key Rotation
Time Interval
(60-86400 sec)
1800
When enabled, unicast and multicast keys are updated after each reauthorization. It is a
best practice to configure the time intervals for reauthentication, multicast key rotation,
and unicast key rotation to be at least 15 minutes. Make sure these intervals are
mutually prime, and the factor of the unicast key rotation interval and the multicast key
rotation interval is less than the reauthentication interval.
Unicast Key Rotation
Time Interval
(60-864000 sec)
900
Authentication Server
Retry Interval
(5-65535 sec)
30
Specify the interface at which reauthentication is supported. The supported range is
from 1 to 6,535 seconds.
Authentication Server
Retry Count
(0-3)
2
Define the number of times that failed authentication should be allowed to retry
authentication.
Framed MTU
(500-1500)
1100
Define the size, in bytes, for framed maximum transmission units.
Number of Times ID-
Requests are Retried
(1-10)
3
Define the number of allowable times that failed ID requests are allowed to retry the
request.
Maximum Number of
Reauthentication
Attempts
(1-10)
3
Set the number of times that reauthentication is to be attempted if the first
authentication attempt fails.
Maximum Number of
Times Held State Can
Be Bypassed
(0-3)
0
Define whether a held state can be bypassed, and the number of times this is to be
allowed.
Dynamic WEP Key
Message Retry Count
(1-3)
1
Define the number of times that failed authentication with a WEP key should be allowed
to retry authentication. The range is from 0 to 3 attempts.
A primary means of cracking WEP keys is to capture 802.11 frames over an extended
period of time and searching for such weak implementations that are still used by many
legacy devices.
Dynamic WEP Key Size
(bits)
128
Specify the maximum size of the WEP key in bits. The options are 40 or 128.
Interval Between WPA/
WPA2 Key Messages
(10-5000 msec)
1000
Specify the key message interval in milliseconds.
Display Between EAP-
Success and WPA2
Unicast Key Exchange
(0-2000 msec)
0
Full field name is
Delay between EAP-Success and WPA2 Unicast Key Exchange
.
Define EAP for RADIUS server authentication.
802.1x uses the Extensible Authentication Protocol (EAP) to exchange messages during
the authentication process. The authentication protocols that operate inside the 802.1x
framework that are suitable for wireless networks include EAP-Transport Layer Security
(EAP-TLS), Protected EAP (PEAP), and EAP-Tunneled TLS (EAP-TTLS). These protocols
allow the network to authenticate the client while also allowing the client to
authenticate the network.
Delay between WPA/
WPA2 Unicast Key
Exchange
(0-2000 msec)
0
Specify the delay between processing these two key times during authentication.
WPA/WPA2 Key
Message Retry Count
(1-10)
3
Specify the number of times that WPA or WPA2 keys are allowed to retry. The supported
range is from 1 to 10.
Multicast Key Rotation
No
Enable or disable multicast key rotation, and define the related settings on this page for
multicast key rotation time and interval if this field is enabled.
Table 9
Profiles > AAA > 802.1x Auth Profile Settings
(Continued)
Field
Default
Description