Brocade Communications Systems Mobility 7131 Series Service Manual Page 26

  • Download
  • Add to my manuals
  • Print
  • Page
    / 520
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 25
14 Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
1
a per-packet key mixing function
a message integrity check
an extended initialization vector with sequencing rules
a re-keying mechanism
WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs
802.1X and Extensible Authentication Protocol (EAP).
For detailed information on WPA using TKIP configurations, see Configuring WPA/WPA2 Using TKIP
on page 6-203.
WPA2-CCMP (802.11i) Encryption
WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi
Protected Access (WPA) and WEP. Counter-mode/CBC-MAC Protocol (CCMP) is the security
standard used by the Advanced Encryption Standard (AES). AES serves the same function TKIP
does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block
Message Authentication Code (CBC-MAC) technique. Changing just one bit in a message produces
a totally different result.
WPA2-CCMP is based on the concept of a Robust Security Network (RSN), which defines a
hierarchy of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator
provides are used to derive other keys. Messages are encrypted using a 128-bit secret key and a
128-bit block of data. The end result is an encryption scheme as secure as any the access point
Mobility 7131 Access Point provides.
For detailed information on WPA2-CCMP, see Configuring WPA2-CCMP (802.11i) on page 6-205.
Firewall Security
A firewall keeps personal data in and hackers out. The Mobility 7131 Access Pointaccess point’s
firewall prevents suspicious Internet traffic from proliferating the access point Mobility 7131 Access
Point managed network. The Mobility 7131 Access Pointaccess point performs Network Address
Translation (NAT) on packets passing to and from the WAN port. This combination provides
enhanced security by monitoring communication with the wired network.
For detailed information on configuring the access point’s Mobility 7131 Access Point firewall, see
Configuring Firewall Settings on page 6-210.
VPN Tunnels
Virtual Private Networks (VPNs) are IP-based networks using encryption and tunneling providing
users remote access to a secure LAN. In essence, the trust relationship is extended from one LAN
across the public network to another LAN, without sacrificing security. A VPN behaves like a private
network; however, because the data travels through the public network, it needs several layers of
security. The Mobility 7131 Access Point access point can function as a robust VPN gateway.
For detailed information on configuring VPN security support, see Configuring VPN Tunnels on page
6-216.
Page view 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 519 520

Comments to this Manuals

No comments