User Manual

Wireless Settings
5-31
5
- TKIP/AES: Uses either TKIP or AES keys for encryption. WPA/WPA2 mixed
modes allow both WPA and WPA2 clients to associate to a common SSID
interface. In mixed mode, the unicast encryption cipher (TKIP or AES-CCMP) is
negotiated for each client.
Default Key ID – Sets the WEP key used
for authentication.
(Default: 1; Range: 1~4)
Key 1 ~ Key 4 – Sets WEP key values.
The user must first choose between ASCII
or Hexadecimal keys. At least one key
must be specified. Each WEP key has an
index number. The selected key is used for authentication and encryption on the
VAP interface. Enter key values that match the key type and length settings.
Standard keys are either 5 or 13 alphanumeric characters; or 10 or 26 hexadecimal
digits.
(Default: ASCII, no prese
t value)
WPA Group-Key ReKey Method – WPA
Rekeying is an extra security measure
whereby the broadcast WPA authentication
key is automatically changed after a certain
time period or after a certain number of packets have been sent. (Default:
Disabled)
WPA Group-Key ReKey Interval – The
elapsed time after which the wireless AP/
Router will change the unicast WPA
authentication key. (Default: 0; Range:
0~67108864)
WPA2 Pairwise Master Key Cache
Interval – The elapsed time after which the
wireless AP/Router will delete the WPA2
master keys from its security association
cache.
WPA2 Pre-Authentication Support – Each time a client roams to another access
point it has to be fully re-authenticated. This authentication process is time
consuming and can disrupt applications running over the network. WPA2 includes
a mechanism, known as pre-authentication, that allows clients to roam to a new
access point and be quickly associated. The first time a client is authenticated to a
wireless network it has to be fully authenticated. When the client is about to roam
to another access point in the network, the access point sends pre-authentication
messages to the new access point that include the client’s security association
information. Then when the client sends an association request to the new access
point, the client is known to be already authenticated, so it proceeds directly to key
exchange and association. Pre-authentication support attaches a security flag to
the packet header. (Default: Disabled)