Chapter 4
| Wireless Settings
Radio Settings
– 70 –
CCMP (AES) — AES-CCMP is used as the multicast encryption
cipher. AES-CCMP is the standard encryption cipher required for
WPA2. (This is the default setting.)
Auto: TKIP + CCMP (AES) — The encryption method used by the
client is discovered by the access point.
Key Method — Uses one of the following PSK methods:
Single PSK — Enables the entry of a single PSK key.
Key — WPA is used to encrypt data transmitted between
wireless clients and the VAP. WPA uses static shared keys (fixed-
length hexadecimal or alphanumeric strings) that are manually
distributed to all clients that want to use the network.
String len
gth must be 8 to 63 ASCII characters (letters and
n
umbers). No special characters are allowed.
Multiple PSK —Enables the entry of multiple PSK keys. Up to 128
keys can be configured.
Multiple Keys — Enter multiple keys, one per line. Entering a
key with a specific MAC address limits the key for use by a
single client. Entering a key without a MAC address enables the
key to be used by all clients.
Multiple keys are supported for WPA-PSK, WPA2-PSK, and
WPA3 Personal Transition security.
Dynamic PSK — Enables the use of dynamic PSK keys that are
periodically generated and updated by a RADIUS authentication
server. The RADIUS server IP address, UDP port, and secret text
string must be specified. (See “RADIUS Settings” below for details.)
Dynamic keys are supported only for WPA2-PSK security.
WPA2-PSK — Clients using WPA2 with a Pre-shared Key are accepted for
authentication.
WPA was introduced as an interim solution for the vulnerability of WEP
pending the ratification of the IEEE 802.11i wireless security standard. In
effect, the WPA security features are a subset of the 802.11i st
andard.
WPA2 includes the now ratified 802.11i standard, but also offers backward
compatibility with WPA. Therefore, WPA2 includes the same 802.1X and
PSK modes of operation and support for TKIP encryption.
Refer to WPA-PSK for a description of encryption methods and the key.