Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

3-50
Wireless Local Area Networks (WLANs)
Configuring a WLAN
With this option, the RPs advertise that they can use either TKIP or
AES to generate encryption keys. Individual stations request the
option they require. TKIP is used for the keys that encrypt multicast
and broadcast traffic to ensure that all stations can receive this traffic.
4. The next configuration tasks depend on the type of authentication chosen.
If you have selected No authentication for the WLAN, complete step 3.
If you have selected 802.1X EAP, then you have finished all required
configuration. However, if you so desire, you can complete step 5 to
configure advanced options.
5. Complete these steps to manually specify the key that users must enter
to connect to the WLAN. These steps are the same no matter the option
selected for WPA/WPA2:
a. Click the Config button next to the name of the encryption option that
you have selected. A screen such as that shown in Figure 3-31 displays.
Figure 3-31. Configuring a Key for WPA/WPA2 Encryption with No Authentication