EasyManuals Logo

H3C MSR Series Configuration Guide

H3C MSR Series
80 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #41 background imageLoading...
Page #41 background image
34
Figure 12 Shared key authentication process
WLAN data security
Compared with wired networks, WLAN networks are more susceptible to attacks because all WLAN
devices share the same medium and thus every device can receive data from any other sending
device. Plain-text data is transmitted over the WLAN if there is no security service.
To secure data transmission, 802.11 protocols provide some encryption methods to ensure that
devices without the right key cannot read encrypted data.
1. WEP encryption
Wired Equivalent Privacy (WEP) was developed to protect data exchanged among authorized
users in a wireless LAN from casual eavesdropping. WEP uses RC4 encryption (a stream
encryption method) for confidentiality and supports WEP40, WEP104, and WEP128 keys.
Although WEP encryption increases the difficulty of network interception and session hijacking,
it still has weaknesses due to limitations of RC4 encryption algorithm and static key
configuration.
2. TKIP encryption
Temporal key integrity Protocol (TKIP) and WEP both use the RC4 algorithm, but TKIP has
several advantages over WEP, and provides more secure protection for WLAN as follows:
{ First, TKIP provides longer IVs to enhance encryption security. Compared with WEP
encryption, TKIP encryption uses 128-bit RC4 encryption algorithm, and increases the
length of IVs from 24 bits to 48 bits.
{ Second, TKIP allows for dynamic key negotiation to avoid static key configuration. TKIP
replaces a single static key with a base key generated by an authentication server. TKIP
dynamic keys cannot be easily deciphered.
{ Third, TKIP offers MIC and countermeasures. If a packet fails the MIC, the data might be
tampered, and the system might be attacked. If two packets fail the MIC in a certain period,
the AP automatically takes countermeasures. It will not provide services in a certain period
to prevent attacks.
3. AES-CCMP encryption
CTR with CCMP is based on the CCM of the AES encryption algorithm. CCM combines CTR for
confidentiality and CBC-MAC for authentication and integrity. CCM protects the integrity of both
the MAC Protocol Data Unit (MPDU) Data field and selected portions of the IEEE 802.11 MPDU
header. The AES block algorithm in CCMP uses a 128-bit key and a 128-bit block size. Similarly,
CCMP contains a dynamic key negotiation and management method, so that each wireless
client can dynamically negotiate a key suite, which can be updated periodically to further
enhance the security of the CCMP encryption mechanism. During the encryption process,
CCMP uses a 48-bit packet number (PN) to ensure that each encrypted packet uses a different
PN, improving the security to a certain extent.
AP
Client
Authentication Request
Authentication ResponseChallenge
AuthenticationEncrypted Challenge
Authentication ResponseSuccess

Table of Contents

Other manuals for H3C MSR Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the H3C MSR Series and is the answer not in the manual?

H3C MSR Series Specifications

General IconGeneral
CategoryNetwork Router
IPv6 SupportYes
DimensionsVaries by model
WeightVaries by model
Product TypeModular Router
PortsVaries by model
WAN InterfacesVaries by model
FirewallYes
QoSYes
Wireless SupportVaries by model
USB PortsVaries by model
Console PortYes
Power SupplyVaries by model
RedundancyVaries by model
Operating Temperature0°C to 45°C
Storage Temperature-40°C to 70°C
Humidity5% to 95% non-condensing
SeriesMSR
CertificationsCE, FCC, RoHS

Related product manuals