Tsunami MP-8100 Installation and Management Guide 65
Sample Security Profile Configuration
4.5.1.2 Modifying a Security Profile
To edit the parameters of the existing security profiles
1. Click ADVANCED CONFIGURATION > Security > Wireless Security.
2. Click Edit. The Wireless Security Edit Row page appears.
3. Edit the parameters and click OK.
4. To apply the configured properties to the device, click COMMIT.
4.5.2 Configuring the Radius Server Profile (BSU Only)
In large networks, you can maintain a list of MAC addresses on a centralized location using a RADIUS authentication server
that grants or denies access.
A RADIUS server profile consists of a Primary and a Secondary RADIUS server that can be assigned to act as MAC
Authentication servers. Configuration of Secondary Authentication Server is optional. The Radius server is referred to only
when it is enabled on the WORP Characteristics page.
BSU SU
Profile Name WORP Security WORP Security
Encryption Type AES-CCM AES-CCM
Key 1 1234567890abcdef 1234567890abcdef
Key 2 1asdf67890abcdef 1asdf67890abcdef
Key 3 abcde7890abcdefg abcde7890abcdefg
Key 4 pjhohm7890abcdef pjhohm7890abcdef
Transmit Key 12
Network Secret public public
Entry status Enable Enable
NOTE:
• By using the preceding security configuration, Wireless link data
follows these constraints:
– At BSU, frames going out from the BSU are encrypted using Key 1
and decrypted using Key 2.
– At SU, frames going out from the SU are encrypted using Key 2 and
decrypted using Key 1.