Alvarion BreezeMAX Wi and BreezeACCESS Wi 214486 Benutzerhandbuch

Seite von 291
 
240
Operation
Chapter 5 - Command Line Interface
Example 
5.20.6 mic_mode 
This command specifies how to calculate the Message Integrity Check (MIC). 
Syntax
mic_mode <hardware | software>
• hardware - Uses hardware to calculate the MIC.
• software - Uses software to calculate the MIC.
Default Setting 
software
Command Mode 
Interface Configuration (Wireless)
Command Usage 
• The Michael Integrity Check (MIC) is part of the Temporal Key Integrity Protocol (TKIP) 
encryption used in WiFi Protected Access (WPA) security. The MIC calculation is performed in 
the AP for each transmitted packet and this can impact throughput and performance. The AP 
supports a choice of hardware or software for MIC calculation. The performance of the AP can 
be improved by selecting the best method for the specific deployment. 
• Using the “hardware” option provides best performance when the number of supported clients is 
less than 27. 
• Using the “software” option provides the best performance for a large number of clients on one 
radio interface. Throughput may be reduced when the 802.11g interface supports a high number of 
clients simultaneously.
Example 
5.20.7 wpa-pre-shared-key 
This command defines a WiFi Protected Access (WPA/WPA2) Pre-shared-key.
Syntax
wpa-pre-shared-key <hex | passphrase-key> <value>
• hex - Specifies hexadecimal digits as the key input format.
• passphrase-key - Specifies an ASCII pass-phrase string as the key input format.
• value - The key string. For ASCII input, specify a string between 8 and 63 characters. For HEX 
input, specify exactly 64 digits.
Command Mode 
Interface Configuration (Wireless-VAP)
Command Usage 
• To support WPA or WPA2 for client authentication, use the auth command to specify the 
authentication type, and use the wpa-preshared-key command to specify one static key.
• If WPA or WPA2 is used with pre-shared-key mode, all wireless clients must be configured with 
the same pre-shared key to communicate with the AP’s VAP interface.
Enterprise AP(if-wireless g: VAP[0])#multicast-cipher TKIP
Enterprise AP(if-wireless g)#
Enterprise AP(if-wireless g)#mic_mode hardware
Enterprise AP(if-wireless g)#