Cisco Systems PI21AG Security and Encryption Types, WEP Shared Security with Static WEP Keys

Page 44
Security and Encryption Types

Chapter 2 Configuring Wireless Profiles

Security and Encryption Types

Security and Encryption Types

The dialog box in Figure 2-5includes the settings that allow you to configure how the client adapter associates to an access point, authenticates to a wireless network, and encrypts and decrypts data. The following sections provide explanations of options that are available in the Security type drop-down list, the Encryption type drop-down list, and the Security Key/Passphrase field of this dialog box.

WEP (Shared) Security with Static WEP Keys

You can protect your data as it is transmitted through your wireless network by encrypting it through the use of wired equivalent privacy (WEP) encryption keys. With WEP encryption, the transmitting device encrypts each packet with a WEP key, and the receiving device uses that same key to decrypt each packet.

The WEP keys used to encrypt and decrypt transmitted data can be statically associated with your client adapter. Static WEP keys are either 40 or 128 bits in length. 128-bit WEP keys offer more security than 40-bit WEP keys.

Each profile can be assigned a static WEP keys. If the device receives a packet that is not encrypted with the appropriate key (as the WEP keys of all devices that are to communicate with each other must match), the device discards the packet and never delivers it to the intended receiver.

You do not need to re-enter the static WEP key each time the client adapter is inserted or the Windows device is rebooted because the key is stored (in an encrypted format for security reasons) in the Windows profile store.

You can obtain a static WEP key from your network administrator.

Note WEP encryption is not considered safe enough for today’s wireless networks. We do not recommend that you use it in enterprise wireless networks.

WPA and WPA2

Wi-Fi Protected Access (WPA) and WPA2 are standards-based security solutions from the Wi-Fi Alliance that provide data protection and access control for wireless LAN systems. WPA is compatible with the IEEE 802.11i standard but was implemented prior to the standard’s ratification; WPA2 is the Wi-Fi Alliance’s implementation of the ratified IEEE 802.11i standard.

WPA and WPA2 can use Temporal Key Integrity Protocol (TKIP) and message integrity check (MIC) for data protection or the stronger Advanced Encryption Standard encryption algorithm using Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP). Both WPA and WPA2 use 802.1X for authenticated key management.

Both WPA and WPA2 support two mutually exclusive key management types: WPA/WPA2 and WPA/WPA2 passphrase (also known as WPA pre-shared key or WPA-PSK). Using WPA or WPA2, clients and the authentication server authenticate to each other using an EAP authentication method, and the client and server generate a pairwise master key (PMK). The server generates the PMK dynamically and passes it to the access point. Using WPA or WPA2 passphrase, however, you configure a passphrase (or pre-shared key) on both the client and the access point, and that passphrase is used as the PMK.

 

Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista

2-10

OL-16534-01

Image 44
Contents Software Release Americas HeadquartersCisco Systems, Inc 170 West Tasman Drive San Jose, CA 800 553-NETS Fax 408Turn the television or radio antenna until the interference stops Network Configurations Using Client Adapters Ad Hoc Wireless LANFCC Safety Compliance Statement PrefaceAdvanced Roaming Setting Two-Phase Tunneled AuthenticationObtaining Client Adapter Software Inserting the CardAccessing LEAP Properties for Configuration Configuring LEAPConfiguring and Starting Logging Finding the Version of the LEAP ModuleCreating Strong Passwords A-9 Antenna Installation WarningEAP Messages A-1 English Translation D-7Channels Acknowledgments and Licensing F-1Chinese Translation English Translationviii OL-16534-01Preface AudiencePurpose Audience, page Purpose, page Organization, page Conventions, pageOrganization ConventionsVaroitus Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja tavanomaisista onnettomuuksien ehkäisykeinoista. Tässä julkaisussa esiintyvien varoitusten käännökset löydät liitteestä Translated Safety Warnings käännetyt turvallisuutta koskevat varoitukset Related Publications Obtaining Documentation, Obtaining Support, and Security GuidelinesProduct Overview and Installation Network Configurations Using Client Adapters, pageSafety information, page Unpacking the Client Adapter, page Installing the Client Adapter Driver and Software, pageIntroduction to the Client Adapters TerminologyPC-Cardbus cardHardware Components RadioRadio Antenna LEDsSoftware Components Network Configurations Using Client AdaptersAd Hoc Wireless LAN Wireless Infrastructure with Workstations Accessing a Wired LAN Figure 1-1 Ad Hoc Wireless LANSafety Guidelines Safety informationFCC Safety Compliance Statement Unpacking the Client Adapter WarningsPackage Contents System Requirementshttp//support.microsoft.com/kb/932063 http//support.microsoft.com/kb/935222For Client Devices Site RequirementsFor Infrastructure Devices 1-10 Inserting the Client AdapterInserting a PC-Cardbus Card Inserting a PCI Card Changing the BracketInsert the card see the “Inserting the Card” section on page Assemble the antenna see the “Assembling the Antenna” section on pageInserting the Card 1-12Assembling the Antenna 1-13Mounting the Antenna 1-141-15 Step 1 Perform one of the following1-16 Step 8 If the Found New Hardware Wizard window appears, click CancelStep 5 Click Wireless Software Step 7 Click Cisco Aironet Wireless LAN Client AdaptersObtaining Client Adapter Software Step 6 Click Client Adapters and Client SoftwareInstalling the Client Adapter Driver and Software 1-18Hardware Insertion 1-19Figure 1-11 Cisco Aironet Installation Program Window 1-20 Figure 1-13 Cisco Aironet Installation Program-Setup Status Window1-21 Step 8 Click Finish1-22 Configuring Wireless Profiles Overview of Wireless Profiles, pageAccessing Microsoft Vista Network and Sharing Center, page Creating a New Profile and Configuring Basic Settings, pageOverview of Wireless Profiles Accessing Microsoft Vista Network and Sharing CenterCreating a New Profile and Configuring Basic Settings Cisco Aironet 802.11a/b/g Wireless Adapter see Figure OL-16534-01 Step 7 In this dialog box, enter information for the wireless network that you want to add.Table 2-1 lists and describes general settings for the profile. Follow the instructions in the table to configure these settings What to Enter Encryption Types” section on pageSetting Profile Management General Settings continued Chapter 3, “Configuring EAP Types.” The enterprise network EAPand Encryption Types” section on page Setting Security and Encryption Types WEP Shared Security with Static WEP KeysWPA and WPA2 2-10802.1X with Dynamic WEP Keys 2-112-12 Accessing a Profile That Was Created PreviouslyCCKM Fast Secure Roaming Figure 2-7 Network and Sharing Center Window Viewing and Changing the Settings of a Profile2-13 2-14 Figure 2-8 Wireless Network properties Dialog Box-Connection Tabis available, Choose Control Panel Manage Wireless Networks Settings dialog box. See the “Radio Measurement” section onpage 2-18 and the “Advanced Roaming Setting” section on page in Table 2-1 on page2-16 Figure 2-9 Wireless Network properties Dialog Box-Security Tab2-17 Radio Measurement 2-18Advanced Roaming Setting 2-192-20 Configuring EAP Types Configuring EAP-FAST, page Overview of LEAP, pageHow LEAP Works, page Configuring LEAP, page Configuring PEAP-GTC, pageTwo-Phase Tunneled Authentication Two-Phase Tunneled Authentication, pageProtected Access Credentials, page How EAP-FAST WorksProtected Access Credentials Server Certificate ValidationConfiguring EAP-FAST Accessing EAP-FAST Properties for ConfigurationAccessing EAP-FAST Properties for Configuration, page Configuring EAP-FAST Settings in the Connection Tab, pageConfiguring EAP-FAST Settings in the Connection Tab Default On Default anonymousDefault On Default NoneDefault Enabled Use Protected AccessDefault Off PAC box and the Validate Server Certificate box at the same timeClient Certificates Usernames and PasswordsOverview of the User Credentials Tab Figure 3-3 User Credentials Tab in EAP-FAST Properties Window Configuring EAP-FAST Settings in the User Credentials Tab3-10 3-11 information about OTP, see the “Understanding PIN Mode and TokenMode with OTP” section on page Understanding PIN Mode and Token Mode with OTP 3-12Figure 3-4 New PIN Prompt Window Figure 3-5 Next Token Prompt WindowConfiguring EAP-FAST Settings in the Authentication Tab 3-13Figure 3-6 Authentication Tab in EAP-FAST Properties Window 3-14Table 3-3 lists and describes options for authentication Default Disabled a certificate on this computer radio button in the User3-15 Select an authenticationFigure 3-7 About Tab in EAP-FAST Properties Window Finding the Version of the EAP-FAST Module3-16 3-17 Overview of LEAPHow LEAP Works Configuring LEAP Accessing LEAP Properties for ConfigurationAccessing LEAP Properties for Configuration, page Configuring LEAP Settings in the Network Credentials Tab, pageFigure 3-8 Wireless Network Properties Window Configuring LEAP Settings in the Network Credentials Tab3-19 3-20 SettingsTable 3-4 LEAP Network Credentials Settings LEAP Network Credentials3-21 Overview of PEAP-GTCFinding the Version of the LEAP Module How PEAP-GTC Works 3-22Configuring PEAP-GTC Accessing PEAP-GTC Properties for ConfigurationAccessing PEAP-GTC Properties for Configuration, page Configuring PEAP-GTC Settings in the Connection Tab, page3-24 Figure 3-10 Wireless Network Properties WindowFigure 3-11 Connection Tab in PEAP-GTC Properties Window Configuring PEAP-GTC Settings in the Connection Tab3-25 Default anonymous If the Validate server certificate box is checked and the Do notprompt user to authorize new servers or trusted certificate If the Validate server certificate box is checked but the Do notConfiguring PEAP-GTC Settings in the User Credentials Tab 3-27Default Off password optionand Token Mode with OTP” section on page which is the case for the Prompt automatically for username andFigure 3-13 New PIN Prompt Window 3-29PEAP-GTC User Credentials Options continued Understanding PEAP-GTC Authentication Finding the Version of the PEAP-GTC Module3-30 Figure 3-14 Next Token Prompt WindowPerforming Administrative Tasks Using Microsoft Tools to Perform Administrative Tasks, pageThe EAP-FAST XML Schema, page The PEAP-GTC XML Schema, page The LEAP XML Schema, page Logging for EAP Modules, pageUsing Microsoft Tools to Perform Administrative Tasks Overview of Group Policy ObjectsAdding a Group Policy Object Editor Overview of Group Policy Objects, pageg. From the Select Group Policy Object dialog box, click Finish Creating a EAP Group Policy Object in Windows Vistaa. Go to File Add/Remove Snap-in Configuring Machine Authentication for EAP-FAST Configuring Single Sign-On for PEAP-GTC and LEAP Configuring Single Sign-On for EAP-FASTConfiguring Machine Authentication for PEAP-GTC The EAP-FAST XML Schema xsdocumentation xselement xschoice xselement name=authenticateWithToken xscomplexType xssequence 4-10 xselement xselement name=sendViaInnerMethod xscomplexType xsall4-11 xscomplexType name=PasswordFromProfile xssimpleContent4-12 4-13 xsannotation xselement xschoice xselement name=enableFastReconnect4-14 4-15 xssimpleType xsrestriction base=xsstring xsenumeration value=exactly4-16 xselement name=anyServerName type=Empty xsannotationThe PEAP-GTC XML Schema 4-174-18 4-19 xscomplexContent xscomplexType xscomplexType name=IdentityPattern4-20 xscomplexType name=TokenSource xschoice4-21 xschoice xssequence xscomplexType4-22 The LEAP XML Schema 4-234-24 attributeFormDefault=unqualified xselement name=eapLeap type=EapLeap4-25 Configuring and Starting Logging Configuring and Starting Logging, pageStep 1 Choose Start All Programs Accessories Step 2 Right-click Command Prompt and select Run as administratorDisabling Logging and Flushing Internal Buffers wevtutil sl Cisco-EAP-FAST/Debug /efalsewevtutil sl Cisco-EAP-PEAP/Debug /efalse wevtutil sl Cisco-EAP-LEAP/Debug /efalseLocating Log Files wevtutil sl Cisco-EAP-FAST/Debug /lfn“pathtoetllogfile”wevtutil sl Cisco-EAP-PEAP/Debug /lfn“pathtoetllogfile” wevtutil sl Cisco-EAP-LEAP/Debug /lfn“pathtoetllogfile”Upgrading the Client Adapter Software, page Routine ProceduresRemoving a Client Adapter, page Removing a PCI Card Removing a Client AdapterRemoving a PC-Cardbus Card Upgrading the Client Adapter Software Step 5 Click Update the previous installation Figure 5-3 Cisco Aironet Installation Program-Setup Status Window OL-16534-01 Enabling Client Reporting, page Troubleshooting and DiagnosticsTroubleshooting with Cisco Aironet Client Diagnostics, page Troubleshooting with Cisco Aironet Client Diagnostics Figure 6-1 Network and Sharing Center WindowFigure 6-2 Cisco Aironet Client Diagnostics Dialog Box Figure 6-3 Cisco Aironet Client Diagnostics Dialog Box-Choose AdapterFigure 6-5 Cisco Aironet Client Diagnostics Dialog Box-Testing Delay Figure 6-6 Cisco Aironet Client Diagnostics Dialog Box-Test Window Figure 6-7 Aironet Desktop Utility-Stop Running DiagnosticsEnabling Client Reporting EAP-FAST Error Messages and Prompts EAP-FAST Error Messages and Prompts, page A-1PEAP-GTC and LEAP Error Messages and Prompts, page A-6 Creating Strong Passwords, page A-9Appendix A EAP Messages EAP-FAST Error Messages and Prompts Page Recommended Action Enter a username Recommended Action Press OK to continue PEAP-GTC and LEAP Error Messages and Prompts Page Page Characteristics of Weak Passwords Creating Strong PasswordsCharacteristics of Strong Passwords Password Security Basics A-10A P P E N D I X B Technical SpecificationsRadio Specifications, page B-3 Physical Specifications Radio Specifications 5150 to 5250 MHz 5250 to 5350 MHz5470 to 5725 MHz 5725 to 5805 MHzIndoor typical Outdoor typicalPower Specifications Safety and Regulatory Compliance SpecificationsTranslated Safety Warnings Antenna Installation Warning, page C-3A P P E N D I X C Explosive Device Proximity Warning, page C-2Explosive Device Proximity Warning Antenna Installation Warning Warning for Laptop Users Page Page Declarations of Conformity and Regulatory Information A P P E N D I X DDepartment of Communications - Canada, page D-3 Declaration of Conformity for RF Exposure, page D-7FCC Certification Number LDK102050 CB21AG Canadian Compliance Statement Department of Communications - CanadaEuropean Community, Switzerland, Norway, Iceland, and Liechtenstein Page Cisco Aironet CB21AG Wireless LAN Client Adapter Declaration of Conformity StatementCisco Aironet PI21AG Wireless LAN Client Adapter Declaration of Conformity for RF Exposure Japanese TranslationEnglish Translation 03-6434-6500English Translation 2.4- and 5-GHz Client AdaptersChinese Translation Brazil/Anatel Approval 5-GHz Client AdaptersAIR-CB21AG-W-K9 D-10AIR-PI21AG-W-K9 D-11D-12 Channels, Power Levels, and Antenna Gains Channels, page E-2 Maximum Power Levels and Antenna Gains, page E-4A P P E N D I X E Channels IEEE 802.11aIEEE 802.11b/g Regulatory DomainsMaximum Power Levels and Antenna Gains IEEE 802.11bIEEE 802.11g OL-16534-01 Acknowledgments and Licensing A P P E N D I X FAppendix F Acknowledgments and Licensing Appendix F Acknowledgments and Licensing OL-16534-01Appendix F Acknowledgments and Licensing Abbreviations A P P E N D I X GTable G-1 List of Acronyms continued
Related manuals
Manual 34 pages 15 Kb Manual 286 pages 35.03 Kb Manual 22 pages 28.37 Kb Manual 22 pages 55.14 Kb