D in, Table 127 – H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 378

357
Table 127 Configuration items
Item Description
Authentication Type
•
Open-System—No authentication. With this authentication mode enabled, all
the clients will pass the authentication.
•
Shared-Key—The two parties need to have the same shared key configured for
this authentication mode. You can select this option only when the WEP
encryption mode is used.
•
Open-System and Shared-Key—You can select both open-system and
shared-key authentication.
IMPORTANT:
WEP encryption can be used together with open system and shared-key
authentication.
•
Open system authentication—When this authentication mode is used, a WEP
key is used for encryption only. If the two parties do not use the same key, a
wireless link can still be established, but all data will be discarded.
•
Shared-key authentication—When this authentication mode is used, a WEP
key is used for both authentication and encryption. If the two parties do not use
the same key, the client cannot pass the authentication, and cannot access the
wireless network.
Cipher Suite
Encryption mechanisms supported by the wireless service:
•
AES—Encryption mechanism based on the AES encryption algorithm.
•
TKIP—Encryption mechanism based on the RC4 algorithm and dynamic key
management. When a client that uses TKIP wants to associate with an AP
supporting 802.11n, the client cannot operate in 802.11n mode.
•
AES and TKIP—You can select both AES and TKIP encryption.
Security IE
Wireless service type (IE information carried in the beacon or probe response
frame):
•
WPA—Wi-Fi Protected Access.
•
RSN—An RSN is a security network that allows only the creation of robust
security network associations (RSNAs). It provides greater protection than WEP
and WPA.
•
WPA and RSN—You can select both WPA and RSN..
Key Derivation
Specify the hash algorithm used to generate PTK and GTK based on PMK.
Key derivation type:
•
SHA1—Supports the HMAC-SHA1 hash algorithm.
•
SHA256—Supports the HMAC-SHA256 hash algorithm.
•
SHA1 and SHA256—Supports the HMAC-SHA1 and the HMAC-SHA256 hash
algorithms.
By default, the key derivation type is SHA1.
NOTE:
PSK or 802.1X authentication takes effect only after the key derivation type is
configured.
Encryption
- H3C WX5500E Series Access Controllers H3C WX3500E Series Access Controllers H3C WX2500E Series Access Controllers H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C LSUM3WCMD0 Access Controller Module H3C LSUM1WCME0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module