This document describes how to use and configure Wired Equivalent Privacy (WEP) on a Cisco Autonomous Access Point (AP).
This document assumes that you can make an administrative connection to the WLAN devices, and that the devices function normally in an unencrypted environment. In order to configure a standard 40-bit WEP, you must have two or more radio units that communicate with each other.
The information in this document is based on an 1140 AP that runs Cisco IOS® Release15.2JB.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
WEP is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP uses the stream cipher RC4 for confidentiality, and the Cyclic Redundancy Check-32 (CRC-32) checksum for integrity .
Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) in order to form the RC4 key. A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (zero through nine and A-F). Each character represents four bits, and ten digits of four bits each equals 40 bits; if you add the 24-bit IV, it produces the complete 64-bit WEP key.
A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters. Twenty-six digits of four bits each equals104 bits; if you add the 24-bit IV, it produces the complete 128-bit WEP key. Most devices allow the user to enter the key as 13 ASCII characters.
Two methods of authentication can be used with WEP: Open System Authentication and Shared Key Authentication.
With Open System Authentication, the WLAN client does not need to provide credentials to the AP for authentication. Any client can authenticate with the AP, and then attempt to associate. In effect, no authentication occurs. Subsequently, WEP keys can be used in order to encrypt data frames. At this point, the client must have the correct keys.
With Shared Key Authentication, the WEP key is used for authentication in a four-step, challenge-response handshake:
After the authentication and association, the pre-shared WEP key is also used in order to encrypt the data frames with RC4.
At first glance, it might seem as though Shared Key Authentication is more secure than Open System Authentication, since the latter offers no real authentication. However, the reverse is true. It is possible to derive the keystream used for the handshake if you capture the challenge frames in Shared Key Authentication. Hence, it is advisable to use Open System Authentication for WEP authentication, rather than Shared Key Authentication.
Temporal Key Integrity Protocol (TKIP) was created in order to address these WEP issues. Similar to WEP, TKIP uses RC4 encryption. However, TKIP enhances WEP with the addition of measures such as per-packet key hashing, Message Integrity Check (MIC), and Broadcast key rotation in order to address known WEP vulnerabilities. TKIP uses the RC4 stream cipher with 128-bit keys for encryption and 64-bit keys for authentication.
This section provides the GUI and CLI configurations for WEP.
Complete these steps in order to configure WEP with the GUI.
Use this section in order to configure WEP with the CLI.
ap#show run
Building configuration...
Current configuration : 1794 bytes
!
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ap
!
!
logging rate-limit console 9
enable secret 5 $1$kxBl$OhRR4QtTUVDUA9GakGDFs1
!
no aaa new-model
ip cef
!
!
!
dot11 syslog
!
dot11 ssid wep-config
authentication open
guest-mode
!
!
crypto pki token default removal timeout 0
!
!
username Cisco password 7 0802455D0A16
!
!
bridge irb
!
!
!
interface Dot11Radio0
no ip address
!
encryption key 1 size 40bit 7 447B6D514EB7 transmit-key
encryption mode wep mandatory
!
ssid wep-config
!
antenna gain 0
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio1
no ip address
!
encryption key 1 size 40bit 7 447B6D514EB7 transmit-key
encryption mode wep mandatory
!
ssid wep-config
!
antenna gain 0
dfs band 3 block
channel dfs
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface GigabitEthernet0
no ip address
duplex auto
speed auto
no keepalive
bridge-group 1
bridge-group 1 spanning-disabled
no bridge-group 1 source-learning
!
interface BVI1
ip address dhcp
!
ip forward-protocol nd
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip route 0.0.0.0 0.0.0.0 10.106.127.4
!
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
login local
transport input all
!
end
Enter this command in order to confirm that your configuration works properly:
ap#show dot11 associations
802.11 Client Stations on Dot11Radio0:
SSID [wep-config] :
MAC Address IP address Device Name Parent State
1cb0.94a2.f64c 10.106.127.251 unknown - self Assoc
Use this section in order to troubleshoot your configuration.
These debug commands are useful in order to troubleshoot the configuration:
Here is an example of the log that displays when the client successfully associates to the WLAN:
*Mar 1 02:24:46.246: %DOT11-6-ASSOC: Interface Dot11Radio0, Station
1cb0.94a2.f64c Associated KEY_MGMT[NONE]
When the client enters the wrong key, this error displays:
*Mar 1 02:26:00.741: %DOT11-4-ENCRYPT_MISMATCH: Possible encryption key
mismatch between interface Dot11Radio0 and station 1cb0.94a2.f64c
*Mar 1 02:26:21.312: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating
Station 1cb0.94a2.f64c Reason: Sending station has left the BSS
*Mar 1 02:26:21.312: *** Deleting client 1cb0.94a2.f64c
Revision | Publish Date | Comments |
---|---|---|
1.0 |
30-Sep-2013 |
Initial Release |