Cisco Cisco Aironet 350 Wireless LAN Client Adapter

Página de 12
 
3
Release Notes for Cisco Aironet 340, 350, and CB20A Client Adapter Firmware 5.30.17
OL-4533-01
  New and Changed Information
In order to use Cisco Aironet client adapters with WPA, the access point must be configured only for the 
WPA TKIP cipher. The use of the following migration-mode-supporting ciphers is not supported by 
Cisco WPA clients:
TKIP + WEP128 
TKIP + WEP40 
To support the coexistence of Cisco Aironet WPA clients and non-WPA clients, it is necessary to 
configure separate VLANs and encryption policies on the access point. Specifically, a VLAN with TKIP 
encryption mode and a VLAN with a compatible WEP encryption mode specified would be required.
Note
Refer to the documentation for your access point for specific instructions.
Cisco Aironet Software Requires Completion of Encryption Authorization Form
In order to access Cisco Aironet software from the Software Center on Cisco.com, you must fill out a 
form to receive authorization to download encrypted software. Registered Cisco.com users are required 
to fill out the form only once, but public users must do so once each session, each time software is 
downloaded. A form is automatically created for public users. The form for registered Cisco.com users 
is at the following URL:
New and Changed Information
This section describes new and changed information for Cisco Aironet client adapter firmware version 
5.30.17.
WPA Support
Wi-Fi Protected Access (WPA) is a standards-based, interoperable security enhancement that greatly 
increases the level of data protection and access control for existing and future wireless LAN systems. 
It is derived from and will be compatible with the upcoming IEEE 802.11i standard. WPA leverages 
Temporal Key Integrity Protocol (TKIP) and Michael message integrity check (MIC) for data protection 
and 802.1X for authenticated key management. WPA is supported by the Cisco Wireless Security Suite.
WPA supports two mutually exclusive key management types: WPA and WPA-Pre-shared key 
(WPA-PSK). Using WPA key management, clients and the authentication server authenticate to each 
other using an EAP authentication method, and the client and server generate a pairwise master key 
(PMK). The server generates the PMK dynamically and passes it to the access point. Using WPA-PSK 
key management, however, you configure a pre-shared key on both the client and the access point, and 
that pre-shared key is used as the PMK.