Dell PowerConnect W-Airwave W-Airwave 7.2 Configuration Guide - Page 57
Delay between EAP-Success and WPA2 Unicast Key Exchange, EAP-TLS, Protected EAP PEAP
View all Dell PowerConnect W-Airwave manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 57 highlights
Table 9 Profiles > AAA > 802.1x Auth Profile Settings (Continued) Field Default Description Multicast Key Rotation 1800 Time Interval (60-86400 sec) Unicast Key Rotation 900 Time Interval (60-864000 sec) Authentication Server 30 Retry Interval (5-65535 sec) Authentication Server 2 Retry Count (0-3) Framed MTU 1100 (500-1500) Number of Times ID- 3 Requests are Retried (1-10) Maximum Number of 3 Reauthentication Attempts (1-10) Maximum Number of 0 Times Held State Can Be Bypassed (0-3) Dynamic WEP Key 1 Message Retry Count (1-3) Dynamic WEP Key Size 128 (bits) Interval Between WPA/ 1000 WPA2 Key Messages (10-5000 msec) Display Between EAP- 0 Success and WPA2 Unicast Key Exchange (0-2000 msec) Delay between WPA/ 0 WPA2 Unicast Key Exchange (0-2000 msec) WPA/WPA2 Key 3 Message Retry Count (1-10) Multicast Key Rotation No When enabled, unicast and multicast keys are updated after each reauthorization. It is a best practice to configure the time intervals for reauthentication, multicast key rotation, and unicast key rotation to be at least 15 minutes. Make sure these intervals are mutually prime, and the factor of the unicast key rotation interval and the multicast key rotation interval is less than the reauthentication interval. Specify the interface at which reauthentication is supported. The supported range is from 1 to 6,535 seconds. Define the number of times that failed authentication should be allowed to retry authentication. Define the size, in bytes, for framed maximum transmission units. Define the number of allowable times that failed ID requests are allowed to retry the request. Set the number of times that reauthentication is to be attempted if the first authentication attempt fails. Define whether a held state can be bypassed, and the number of times this is to be allowed. Define the number of times that failed authentication with a WEP key should be allowed to retry authentication. The range is from 0 to 3 attempts. A primary means of cracking WEP keys is to capture 802.11 frames over an extended period of time and searching for such weak implementations that are still used by many legacy devices. Specify the maximum size of the WEP key in bits. The options are 40 or 128. Specify the key message interval in milliseconds. Full field name is Delay between EAP-Success and WPA2 Unicast Key Exchange. Define EAP for RADIUS server authentication. 802.1x uses the Extensible Authentication Protocol (EAP) to exchange messages during the authentication process. The authentication protocols that operate inside the 802.1x framework that are suitable for wireless networks include EAP-Transport Layer Security (EAP-TLS), Protected EAP (PEAP), and EAP-Tunneled TLS (EAP-TTLS). These protocols allow the network to authenticate the client while also allowing the client to authenticate the network. Specify the delay between processing these two key times during authentication. Specify the number of times that WPA or WPA2 keys are allowed to retry. The supported range is from 1 to 10. Enable or disable multicast key rotation, and define the related settings on this page for multicast key rotation time and interval if this field is enabled. Dell PowerConnect W AirWave 7.2 | Configuration Guide Dell PowerConnect W Configuration Reference | 57