Siemens EF 711 Series Betriebsanweisung Seite 205

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 492
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 204
Configuring WLAN Services
Configuring Privacy
SCALANCE WLC711
User Guide, V8.11, 07/2012, C79000-G8976-C260-03 6-9
Static Wired Equivalent Privacy (WEP) — Keys for a selected VNS, so that it matches the
WEP mechanism used on the rest of the network. Each AP can participate in up to 50 VNSs.
For each VNS, only one WEP key can be specified. It is treated as the first key in a list of WEP
keys.
Dynamic Keys — The dynamic key WEP mechanism changes the key for each user and each
session.
Wi-fi Protected Access (WPA)
version 1 with encryption by temporal key integrity protocol (TKIP)
version 2 with encryption by advanced encryption standard with counter-mode/CBC-
MAC protocol (AES-CCMP)
Wi-Fi Protected Access (WPA) Pre-Shared key (PSK) — Privacy in PSK mode, using a Pre-
Shared Key (PSK), or shared secret for authentication. WPA-PSK is a security solution that
adds authentication to enhanced WEP encryption and key management. WPA-PSK mode
does not require an authentication server. It is suitable for home or small office.
Note:
Regardless of the Wireless AP model or WLAN Service type, a maximum of 112 simultaneous clients, per
radio, are supported by all of the data protection encryption techniques.
About Wi-Fi Protected Access (WPA V1 and WPA V2)
Note:
To achieve the strongest encryption protection for your VNS, Siemens recommends that you use WPA v.1 or
WPA v.2.
WPA v1 and WPA v2 add authentication to WEP encryption and key management. Key features
of WPA privacy include:
Specifies 802.1x with Extensible Authentication Protocol (EAP)
Requires a RADIUS or other authentication server
Uses RADIUS protocols for authentication and key distribution
Centralizes management of user credentials
The encryption portion of WPA v1 is Temporal Key Integrity Protocol (TKIP). TKIP includes:
A per-packet key mixing function that shares a starting key between devices, and then
changes their encryption key for every packet (unicast key) or after the specified re-key time
interval (broadcast key) expires
An enhanced Initialization Vector (IV) of 48 bits, instead of 24 bits, making it more difficult to
compromise
A Message Integrity Check or Code (MIC), an additional 8-byte code that is inserted before
the standard WEP 4-byte Integrity Check Value (ICV). These integrity codes are used to
calculate and compare, between sender and receiver, the value of all bits in a message, which
ensures that the message has not been tampered with.
The encryption portion of WPA v2 is Advanced Encryption Standard (AES). AES includes:
A 128-bit key length, for the WPA2/802.11i implementation of AES
Four stages that make up one round. Each round is iterated 10 times.
Seitenansicht 204
1 2 ... 200 201 202 203 204 205 206 207 208 209 210 ... 491 492

Kommentare zu diesen Handbüchern

Keine Kommentare