D in, Table 127 – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 378

Advertising
background image

357

Table 127 Configuration items

Item Description

Authentication Type

Open-System—No authentication. With this authentication mode enabled, all
the clients will pass the authentication.

Shared-Key—The two parties need to have the same shared key configured for

this authentication mode. You can select this option only when the WEP

encryption mode is used.

Open-System and Shared-Key—You can select both open-system and

shared-key authentication.

IMPORTANT:

WEP encryption can be used together with open system and shared-key

authentication.

Open system authentication—When this authentication mode is used, a WEP

key is used for encryption only. If the two parties do not use the same key, a

wireless link can still be established, but all data will be discarded.

Shared-key authentication—When this authentication mode is used, a WEP

key is used for both authentication and encryption. If the two parties do not use

the same key, the client cannot pass the authentication, and cannot access the
wireless network.

Cipher Suite

Encryption mechanisms supported by the wireless service:

AES—Encryption mechanism based on the AES encryption algorithm.

TKIP—Encryption mechanism based on the RC4 algorithm and dynamic key

management. When a client that uses TKIP wants to associate with an AP
supporting 802.11n, the client cannot operate in 802.11n mode.

AES and TKIP—You can select both AES and TKIP encryption.

Security IE

Wireless service type (IE information carried in the beacon or probe response
frame):

WPA—Wi-Fi Protected Access.

RSN—An RSN is a security network that allows only the creation of robust

security network associations (RSNAs). It provides greater protection than WEP

and WPA.

WPA and RSN—You can select both WPA and RSN..

Key Derivation

Specify the hash algorithm used to generate PTK and GTK based on PMK.
Key derivation type:

SHA1—Supports the HMAC-SHA1 hash algorithm.

SHA256—Supports the HMAC-SHA256 hash algorithm.

SHA1 and SHA256—Supports the HMAC-SHA1 and the HMAC-SHA256 hash

algorithms.

By default, the key derivation type is SHA1.

NOTE:

PSK or 802.1X authentication takes effect only after the key derivation type is

configured.

Encryption

Advertising