EasyManuals Logo

H3C MSR Series Configuration Guide

H3C MSR Series
80 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #46 background imageLoading...
Page #46 background image
39
WEP40/WEP104/WEP128
TKIP
AES-CCMP
Configuring WEP cipher suite
The WEP encryption mechanism requires that the authenticator and clients on a WLAN have the
same key configured. WEP adopts the RC4 algorithm (a stream encryption algorithm), supporting
WEP40, WEP104 and WEP128 keys.
You can use WEP with either open system or shared key authentication mode:
In open system authentication mode, the WEP key is used for encryption only and not for
authentication. A client can access the network without having the same key as the
authenticator. However, if the receiver has a different key from the sender, it discards the
packets received from the sender.
In shared key authentication mode, the WEP key is used for both encryption and authentication.
If the key of a client is different from that of the authenticator, the client cannot pass the
authentication and the access of the client is denied.
To configure WEP encryption:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter WLAN service
template view.
wlan service-template
service-template-number
crypto
N/A
3. Enable the WEP cipher
suite.
cipher-suite
{
wep40
|
wep104
|
wep128
}
By default, no cipher suite is
selected.
4. Configure the WEP default
key.
wep default-key
{
1
|
2
|
3
|
4
}
{
wep40
|
wep104
|
wep128
}
{
pass-phrase
|
raw-key
} [
cipher
|
simple
] key
By default, the WEP default key
index number is 1.
5. Specify a key index
number.
wep key-id
{
1
|
2
|
3
|
4
}
Optional.
By default, the key index number
is that configured with the
wep
default-key
command.
Configuring TKIP cipher suite
Message integrity check (MIC) is used to prevent attackers from data modification. It ensures data
security by using the Michael algorithm. When a fault occurs to the MIC, the device will consider that
the data has been modified and the system is being attacked. Upon detecting the attack, TKIP will
suspend within the countermeasure interval. No TKIP associations can be established within the
interval.
To configure TKIP cipher suite:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enter WLAN service
template view.
wlan service-template
service-template-number
crypto
N/A
3. Enable the TKIP cipher
suite.
cipher-suite
tkip
By default, no cipher suite is
selected.
4. Configure the TKIP
countermeasure interval.
tkip-cm-time
time
Optional.
The default countermeasure
interval is 0 seconds. No

Table of Contents

Other manuals for H3C MSR Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the H3C MSR Series and is the answer not in the manual?

H3C MSR Series Specifications

General IconGeneral
CategoryNetwork Router
IPv6 SupportYes
DimensionsVaries by model
WeightVaries by model
Product TypeModular Router
PortsVaries by model
WAN InterfacesVaries by model
FirewallYes
QoSYes
Wireless SupportVaries by model
USB PortsVaries by model
Console PortYes
Power SupplyVaries by model
RedundancyVaries by model
Operating Temperature0°C to 45°C
Storage Temperature-40°C to 70°C
Humidity5% to 95% non-condensing
SeriesMSR
CertificationsCE, FCC, RoHS

Related product manuals