Cisco Systems
Close Window

 
     
 
   



Main Help Topics

Basic Setting
Security
Filters
QoS Configuration
Radio Configuration
VLAN Configuration
Ethernet Configuration
Server Setup
Proxy Mobile IP
Routing Setup
Network Management
Event Notification
Update Firmware
Distribute Firmware and Configuration
Diagnostics
Hot Standby Setup
Index of Help Topics

Security : AP/Root Radio Data Encryption

You use Wired Equivalent Privacy (WEP) to encrypt radio signals sent by the device and decrypt radio signals received by the device. This page allows you to select authentication types for the access point. The internal radio and the radio module both have an AP Radio Data Encryption page. Both pages contain the same settings, but you can can assign different security settings to each radio.

Settings

Use of Data Encryption by Station is:

Determine whether clients should use data encryption when communicating with the device. WEP is enabled by selecting Optional or Full Encryption. The three options are:

  • No encryption -- (Default) The device communicates only with client devices that are not using WEP.
  • Optional -- Client devices can communicate with this access point or bridge either with or without WEP.
  • Full encryption -- Client devices must use WEP when communicating with the access point or bridge. Devices not using WEP are not allowed to communicate.
  • Not available - You must set an encryption key or enable Broadcast Key Rotation first.
Note You must set a WEP key before you enable use of encryption.

Accept Authentication Types

Select how to set the authentications the device recognizes.

  • Open -- (Default) Allows any device to authenticate and then attempt to communicate with the bridge or access point. If the bridge or access point is using WEP and the other device is not, the other device does not attempt to authenticate with the bridge. If the other device is using WEP but its WEP keys do not match the keys on the bridge or access point, the other device authenticates with the bridge or access point but does not pass data to it. The device’s WEP key does not match the bridge’s or access point's key, so it can authenticate but not pass data.
Note While a bridge or access point can use EAP to authenticate a wireless client device, a bridge or access point cannot use EAP to authenticate another bridge or access point. In other words, when two bridges communicate with each other, the bridges must authenticate each other using the open or shared key authentication type.
  • Shared key -- The bridge or access point sends an unencrypted challenge text string to any device attempting to communicate with the bridge/access point. The device requesting authentication encrypts the challenge text and sends it back to the bridge or access point. If the challenge text is encrypted correctly, the bridge or access point allows the requesting device to authenticate. Both the unencrypted challenge and the encrypted challenge can be monitored, however, which leaves the bridge or access point open to attack from an intruder who guesses the WEP key by comparing the unencrypted and encrypted text strings. Because of this weakness, Shared Key authentication can be less secure than Open authentication.
  • Network-EAP -- The device uses the Extensible Authentication Protocol (EAP) to interact with an EAP-compatible RADIUS server on your network to provide authentication for wireless client devices. Client devices use dynamic WEP keys to authenticate to the network.

Require EAP

If you use open or shared authentication as well as EAP authentication, select Require EAP under Open or Shared to block client devices that are not using EAP from authenticating through the access point.

Transmit with Key

Click the Transmit with Key button to allow you to select the key this device uses when transmitting data. Only one key can be selected at a time. All set keys can be used to receive data. The selected key must already be set before it can be specified as the Transmit key.

Note The key that you select as the transmit key must also be entered in the same key slot on client devices that associate with the access point or bridge, but it does not have to be selected as the transmit key on the client devices.

Encryption Key

Enter a WEP key in one of the Encryption Key fields. For 40-bit encryption, enter 10 hexadecimal digits; for 128-bit encryption, enter 26 hexadecimal digits. Hexadecimal digits are a set of characters that includes numbers 0 through 9, lower-case letters a through f, and uppercase letters A through F. Your WEP keys can contain combinations of any of these characters. WEP keys are not case-sensitive.

You can enter up to four WEP keys. The key that you select as the transmit key must also be entered in the same key slot on client devices that associate with the access point or bridge, but it does not have to be selected as the transmit key on the client devices.

This table shows an example WEP key setup that would work for the access point or bridge and an associated client device.

 

Key Slot

Access Point/Bridge

Client Device

Transmit?

Key Contents

Transmit?

Key Contents

WEP Key 1

x

12345678901234567890abcdef

 

12345678901234567890abcdef

WEP Key 2

 

09876543210987654321fedcba

x

09876543210987654321fedcba

 

WEP Key 3

 

not set

 

not set

WEP Key 4

 

not set

 

FEDCBA09876543211234567890

Because the WEP key 2 is selected as the transmit key, WEP key 2 on the client device must contain the same contents. WEP key 4 on the client device is set, but because it is not selected as the transmit key, WEP key 4 on the access point/bridge does not need to be set at all.

The characters you type for the key contents appear only when you type them. After you click Apply or OK, you cannot view the key contents.

You cannot delete a WEP key, but you can write new characters over an existing key.

Key Size

Select 40-bit or 128-bit encryption for each key. The not set selection clears the key and indicates empty key slots.

Action Buttons

Command

Description

Apply

Activates the new setting. The browser remains on this page.

OK

Applies the new settings and moves the browser back to the main Setup page.

Cancel

Cancels all changes to the setting, returns the settings to the previously stored values, and redirects the user back the main Setup page.

Restore Defaults

Changes all settings back to the factory default.

 

 
 

Copyright (c) 1992-2002 by Cisco Systems, Inc.