Enterasys Networks 802.11 User Manual

Page 52

Advertising
background image

Security

2-18

4.

Once the AP transmits the new keys to all clients in the supplicant list, it begins using
the new TX key (Key4). At this time all supplicants are using Key3 as their TX key.

5.

The key period expires. The AP creates two new random keys, loads them into the
inactive authenticator key indexes (Keys 1 and 2 in this example), and repeats the
process (starting at step 3).

AP

Client

Key #

Encryption

TX/RX

State

TX/RX

Encryption

Key1

aaaaaaaaaaaaaa Inactive

aaaaaaaaaaaaaa

Key2 bbbbbbbbbbbbb

Inactive

bbbbbbbbbbbbb

Key3 cccccccccccccc

RX

Active

TX

cccccccccccccc

Key4

ddddddddddddd

TX

Active

RX

ddddddddddddd

AP

Client

Key #

Encryption

TX/RX

State

TX/RX

Encryption

Key1

eeeeeeeeeeeee Inactive

aaaaaaaaaaaaaa

Key2

fffffffffffff

Inactive

bbbbbbbbbbbbb

Key3 cccccccccccccc

RX

Active

TX

cccccccccccccc

Key4

ddddddddddddd

TX

Active

RX

ddddddddddddd

Advertising