CHAPTER 6: COMMAND LINE INTERFACE
and a
•TKIP defends against attacks on WEP in which the unencrypted initialization vector in encrypted packets is used to calculate the WEP key. TKIP changes the encryption key on each packet, and rotates not just the unicast keys, but the broadcast keys as well. TKIP is a replacement for WEP that removes the predictability that intruders relied on to determine the WEP key.
•
Example
Outdoor 11a Building to Building
mic_mode
This command specifies how to calculate the Message Integrity Check (MIC).
Syntax
mic_mode <hardware software>
•hardware - Uses hardware to calculate the MIC.
•software - Uses software to calculate the MIC.
Default Setting
software
Command Mode
Interface Configuration (Wireless)
Command Usage
•The Michael Integrity Check (MIC) is part of the Temporal Key Integrity Protocol (TKIP) encryption used in