Example wep key setup, Enabling cipher suites and wep – Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual

Page 347

Advertising
background image

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014

347

Configuring Cipher Suites and WEP

Chapter 11

Example WEP Key Setup

This table shows an example WEP key setup that works for the access point and
an associated device:

Because the access point’s WEP key 1 is selected as the transmit key, WEP key 1
on the other device must have the same contents. WEP key 4 on the other device
is set, but because it is not selected as the transmit key, WEP key 4 on the access
point does not need to be set at all.

Enabling Cipher Suites and WEP

Beginning in privileged EXEC mode, follow these steps to enable a cipher suite:

1. Enter global configuration mode.

configure terminal

2. Enter interface configuration mode for the radio interface. The 2.4 GHz

radio is radio 0, and the 5 GHz radio is radio 1.

interface dot11radio { 0 | 1 }

3. Enable a cipher suite containing the WEP protection you need.

Table 94 on page 349

lists guidelines for selecting a cipher suite that

matches the type of authenticated key management you configure.

4. (Optional) Select the VLAN that you want enabled for WEP and WEP

features.

5. Set the cipher options and WEP level.

You can combine TKIP with 128-bit or 40-bit WEP.
If you enable a cipher suite with two elements (such as TKIP and 128-

bit WEP), the second cipher becomes the group cipher.

Table 93 - WEP Key Setup Example

Key Slot Access Point

Associated Device

Transmit?

Key Contents

Transmit?

Key Contents

1

x

12345678901234567890abcdef

12345678901234567890abcdef

2

09876543210987654321fedcba

x

09876543210987654321fedcba

3

not set

not set

4

not set

FEDCBA09876543211234567890

IMPORTANT

If you enable MIC but you use static WEP (you don’t enable any type of EAP
authentication), both the access point and any devices it communicates with
must use the same WEP key for transmitting data. For example, if the MIC-
enabled access point uses the key in slot 1 as the transmit key, a client device
associated to the access point must use the same key in its slot 1, and the key in
the client’s slot 1 must be selected as the transmit key.

Advertising