WESM zl Management and Configuration Guide WT.01.XX and greater

4-61
Wireless Local Area Networks (WLANs)
Configuring a WLAN
In the Update broadcast keys every field, you can enter any value from
60 seconds (one minute) through 86,400 seconds (one day). The shorter
the rotation period, the more secure, but also the more overhead added
by the key redistribution.
6. Click the OK button to apply your settings and close the WPA/WPA2 screen.
7. Click the OK button in the WLAN’s Edit screen to apply your settings.
Configuring Encryption for a WLAN that Uses MAC Authentication.
A WLAN that enforces MAC authentication to a network server can also
provide wireless encryption. In this case, a wireless user must pass two tests
to connect to the WLAN: the user’s station must pass MAC authentication, and
the user must enter the correct WEP or WPA/WPA2 key.
This section explains how to add encryption to a WLAN already configured
for RADIUS MAC authentication. See “MAC Authentication” on page 4-43 for
instructions on configuring the authentication.
After selecting MAC Authentication in a WLAN’s Edit screen, you have several
choices for which boxes in the Encryption section to check. Table 4-5 summa-
rizes these options and refers you to section that explains how to configure
the second security option.
Table 4-5. Encryption Options for RADIUS MAC Authentication
Encryption Option Security Option Reference
WEP 64 static WEP “Configuring Static WEP
Encryption (No
Authentication)” on
page 4-48
WEP 128 static WEP “Configuring Static WEP
Encryption (No
Authentication)” on
page 4-48
WPA/WPA2-TKIP WPA/WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58
WPA2-AES WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58
WPA/WPA2-TKIP and
WPA2-AES
WPA/WPA2-PSK “Configuring WPA/WPA2-
PSK” on page 4-58