H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 274

Advertising
background image

31-20

Item

Description

Encryption

Provide Key
Automatically

Enable: A WEP key is dynamically assigned.

Disable: A static WEP key is used.

By default, a static WEP key is used.

When you enable this function, the WEP option is automatically set to wep104.

This function must be used together with 802.1X authentication.

With dynamic WEP encryption configured, the WEP key used to encrypt
unicast frames is negotiated between client and server. If the WEP default key
is configured, the WEP default key is used to encrypt multicast frames. If not,
the device randomly generates a multicast WEP key.

WEP

wep40: Indicates the WEP40 key option.

wep104: Indicates the WEP104 key option.

wep128: Indicates the WEP128 key option.

Key ID

1: Key index 1.

2: Key index 2.

3: Key index 3.

4: Key index 4.

There are 4 static keys in WEP. The key index can be 1, 2, 3 or 4. The key
corresponding to the specified key index will be used for encrypting and decrypting
broadcast and multicast frames.

Key Length

Key length.

For wep40, the key is a string of 5 alphanumeric characters or a 10-digit
hexadecimal number.

For wep104, the key is a string of 13 alphanumeric characters or a 26-digit
hexadecimal number.

For wep128, the key is a string of 16 alphanumeric characters or a 32-digit
hexadecimal number.

WEP Key

Configure the WEP key.

Port Security

See

Table 31-4

.

Parameters such as authentication type and encryption type determine the port
mode. For details, refer to

Table 31-12

.

After you select the Cipher Suite option, the following three port security modes
are added:

mac and psk: MAC-based authentication must be performed on access users
first. If MAC-based authentication succeeds, an access user has to use the
pre-configured PSK to negotiate with the device. Access to the port is allowed
only after the negotiation succeeds.

psk: An access user must use the pre-shared key (PSK) that is pre-configured
to negotiate with the device. The access to the port is allowed only after the
negotiation succeeds.

userlogin-secure-ext: Perform MAC-based 802.1X authentication for access
users. In this mode, the port supports multiple 802.1X users.

1) Configuring mac and psk

Advertising