Wpa migration mode, Wpa security, Table 4 - wpa-personal (psk) configuration – Quatech WLNG-ET-DP500 Series User Manual
Page 37: Table 5 - wpa-leap configuration, 1 wpa migration mode, 3 wpa security
Quatech, Inc.
Company Confidential
100-8081-100
Airborne CLI Reference Manual
37
Command
Description
wl-def-key 1
Configures the default WEP key to be used.
wl-key-1 12345678901234567890123456 Defines the 128 bit key as 26 hex digits. This
key must match the key on the AP.
10.2.1 WPA Migration Mode
Cisco infrastructure supports a migration mode that allows both legacy WEP and
WPA client can coexist on the same network.
Quatech has developed and provides a number of options for support of the
WPA migration mode, if it is being used by the target infrastructure. These
optional parameters are fully described in section 14.0. They allow the use of
WPA or WEP as the authentication process.
10.3 WPA Security
WiFi Protected Access (WPA) is a compatibility certification program created by
the WiFi Alliance to indicate compliance to a minimum set of security and
functional capabilities for 802.11 devices. The WPA certification program was
created to mitigate the issues created by the devaluation of the WEP security
standard.
WPA utilizes part of the 802.11i security standard but relies upon the same RC4
cipher as WEP. WPA introduced Temporal Key Interchange Protocol (TKIP) to
802.11 security and this significantly mitigated the flaws that existed in WEP. It
not only hid the key more securely but provided packet sequencing and Message
Integrity Checking (Michael).
Quatech supports both WPA Personal and WPA-LEAP, the following table
identify the settings required for configuration of these security methods.
Table 4 - WPA-Personal (PSK) Configuration
Command
Description
wl-security wpa-psk
Defines WPA with a Preshared Key (PSK).
pw-wpa-psk password
Defines the preshared key used by the AP.
Must be 8-63 ASCII characters long.
Table 5 - WPA-LEAP Configuration
Command
Description
wl-security wpa-leap
Defines WPA with EAP-LEAP authentication.
This requires the use of a RADIUS server on
the target network, the server must support
the LEAP authentication process.
user-leap MyUserName
Defines the username to be used for
authentication with the RADIUS server. There
must be a valid user account with the defined
name.