• dont-verify-certificate - require a certificate, but do not chack, if it has been signed by the
available CA certificate
• verify-certificate - require a certificate and verify that it has been signed by the available CA
certificate
unicast-ciphers ( multiple choice: tkip | aes-ccm ) - a set of ciphers used to encrypt frames sent to
individual wireless station (unicast transfers) in the order of preference
• tkip - Temporal Key Integrity Protocol - encryption protocol, compatible with lagacy WEP
equipment, but enhanced to correct some of WEP flaws
• aes-ccm - more secure WPA encryption protocol, based on the reliable AES (Advanced
Encryption Standard). Networks free of WEP legacy should use only this
wpa2-pre-shared-key ( text ; default: "" ) - string, which is used as the WPA2 Pre Shared Key. It
must be the same on AP and station to communicate
wpa-group-ciphers ( aes-ccm | tkip ; default: "" ) - which algorithms to use for WPA group
communications (for multicast and broadcast packets). If the interface is an Access Point, it will use
the "strongest" algorithm from AES and TKIP (AES is "stronger"). If the interface acts as a station,
it will connect to Access Points which support at least one of selected algorithms
wpa-pre-shared-key ( text ; default: "" ) - string, which is used as the WPA Pre Shared Key. It
must be the same on AP and station to communicate
wpa-unicast-ciphers ( aes-ccm | tkip ; default: "" ) - which algorithms are allowed to use for
unicast communications. If the interface is an Access Point, then it sends these algorithms as
supported. If it is a station, then it will connect only to APs which support any of these algorithms
Notes
The keys used for encryption are in hexadecimal form. If you use 40bit-wep, the key has to be 10
characters long, if you use 104bit-wep, the key has to be 26 characters long.
Prism card doesn't report that the use of WEP is required for all data type frames, which means that
some clients will not see that access point uses encryption and will not be able to connect to such
AP. This is a Prism hardware problem and can not be fixed. Use Atheros-based cards (instead of
Prism) on APs if you want to provide WEP in your wireless network.
Wireless encryption cannot work together with wireless compression.
Sniffer
Home menu level: /interface wireless sniffer
Description
With wireless sniffer you can sniff packets from wireless networks.
Property Description
channel-time ( time ; default: 200ms ) - how long to sniff each channel, if multiple-channels is set
to yes
file-limit ( integer ; default: 10 ) - limits file-name's file size (measured in kilobytes)
Page 274 of 695
Copyright 1999-2007, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA.
Other trademarks and registred trademarks mentioned herein are properties of their respective owners.