Cisco Cisco WAP561 Wireless-N Dual Radio Selectable Band Access Point Manual De Mantenimiento

Descargar
Página de 173
Wireless
Networks
Cisco Small Business WAP551 and WAP561 Wireless-N Access Point
79
5
-
WPA2—If all client stations on the network support WPA2, we suggest 
using WPA2 which provides the best security per the IEEE 802.11i 
standard.
-
WPA and WPA2—If you have a mix of clients, some of which support 
WPA2 and others which support only the original WPA, select both WPA 
and WPA2. This setting lets both WPA and WPA2 client stations 
associate and authenticate, but uses the more robust WPA2 for clients 
who support it. This WPA configuration allows more interoperability, in 
place of some security. 
Enable pre-authentication—If for WPA Versions you select only WPA2 or 
both WPA and WPA2, you can enable pre-authentication for WPA2 clients.
Click Enable pre-authentication if you want WPA2 wireless clients to send 
pre-authentication packets. The pre-authentication information is relayed 
from the WAP device that the client is currently using to the target WAP 
device. Enabling this feature can help speed up authentication for roaming 
clients who connect to multiple APs.
This option does not apply if you selected WPA for WPA Versions because 
the original WPA does not support this feature.
Cipher Suites—The cipher suite you want to use:
-
TKIP
-
CCMP (AES)
-
TKIP and CCMP (AES)
By default both TKIP and CCMP are selected. When both TKIP and CCMP 
are selected, client stations configured to use WPA with RADIUS must have 
one of these addresses and keys:
-
A valid TKIP RADIUS IP address and RADIUS Key
-
A valid CCMP (AES) IP address and RADIUS Key
Use Global RADIUS Server Settings—By default, each VAP uses the 
global RADIUS settings that you define for the WAP device (see 
). However, you can configure each VAP to use a different set of 
RADIUS servers.
To use the global RADIUS server settings, make sure the check box is 
selected.