Example wep key setup, Enabling cipher suites and wep – Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual
Page 347
![background image](/manuals/579394/347/background.png)
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
347
Configuring Cipher Suites and WEP
Chapter 11
Example WEP Key Setup
This table shows an example WEP key setup that works for the access point and
an associated device:
Because the access point’s WEP key 1 is selected as the transmit key, WEP key 1
on the other device must have the same contents. WEP key 4 on the other device
is set, but because it is not selected as the transmit key, WEP key 4 on the access
point does not need to be set at all.
Enabling Cipher Suites and WEP
Beginning in privileged EXEC mode, follow these steps to enable a cipher suite:
1. Enter global configuration mode.
configure terminal
2. Enter interface configuration mode for the radio interface. The 2.4 GHz
radio is radio 0, and the 5 GHz radio is radio 1.
interface dot11radio { 0 | 1 }
3. Enable a cipher suite containing the WEP protection you need.
lists guidelines for selecting a cipher suite that
matches the type of authenticated key management you configure.
4. (Optional) Select the VLAN that you want enabled for WEP and WEP
features.
5. Set the cipher options and WEP level.
You can combine TKIP with 128-bit or 40-bit WEP.
• If you enable a cipher suite with two elements (such as TKIP and 128-
bit WEP), the second cipher becomes the group cipher.
Table 93 - WEP Key Setup Example
Key Slot Access Point
Associated Device
Transmit?
Key Contents
Transmit?
Key Contents
1
x
12345678901234567890abcdef
–
12345678901234567890abcdef
2
–
09876543210987654321fedcba
x
09876543210987654321fedcba
3
–
not set
–
not set
4
–
not set
–
FEDCBA09876543211234567890
IMPORTANT
If you enable MIC but you use static WEP (you don’t enable any type of EAP
authentication), both the access point and any devices it communicates with
must use the same WEP key for transmitting data. For example, if the MIC-
enabled access point uses the key in slot 1 as the transmit key, a client device
associated to the access point must use the same key in its slot 1, and the key in
the client’s slot 1 must be selected as the transmit key.