Many
Manuals
search
Categorias
Marcas
Principal
Aruba
Pontos de acesso WLAN
800 Series
Manual do Utilizador
Aruba 800 Series Manual do Utilizador Página 33
Descarregar
Partilhar
Partilha
Adicionar aos meus manuais
Imprimir
Página
/
36
Índice
MARCADORES
Avaliado
.
/ 5. Com base em
avaliações de clientes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
33
CSP
CSP TYPE
GENERATION
STORAGE
And
ZEROIZATI
ON
USE
WPA2 PSK
16
-
64
character
shared secret
used to
authenticate
mesh
connections
and in
remote AP
advanced
configuration
CO configured
Encrypted in
flash using the
KEK; zeroized
by updating
through
administrative
in
terface, or b
y
the ‘ap wipe
out flash’
command.
Used to derive
the PMK for
802.11i mesh
connections
between APs
and in
advanced
Remote AP
connections;
programmed
into AP by the
controller over
the IPSec
session.
802.11i P
airwis
e Ma
ster
Key (PMK)
512
-bit
shared secret
used to
derive
802.11i
session keys
Derived from WPA2
PSK
In volatile
memory only;
zeroized o
n
reboot
Used to derive
802.11i
Pairwise
Transient Key
(PTK)
802.11i P
airwis
e T
ransient
Key (PTK)
512
-bit
shared secret
from which
Temporal
Keys (TKs)
are derived
Derived during 802.
11i
4-way handshake
In volatile
memory only;
zeroized o
n
reboot
All session
encryption/dec
ryption keys
are derived
from the PT
K
802.11i
EAPOL MIC Key
128
-bit
shared secret
used to
protect 4
-
way (key)
handshake
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
integrity
validation in 4-
way
handshake
802.11i EAPOL Encr Ke
y
128
-bit
shared secret
used to
protect 4
-
way
handshakes
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
confidentiality
in 4-way
handshake
802.11i data
AES-CCM
encryption/MIC key
128
-bit AES-
CCM key
Derived from PT
K
Stored in
plaintext in
volatile
memory;
zeroized o
n
reboot
Used for
802.11i pac
ket
encryption and
integrity
verification
(this is the
CCMP or
AES-CCM
key)
1
2
...
28
29
30
31
32
33
34
35
36
Wireless Access Points
1
1 Introduction
5
2 Product Overview
7
3 Module Objectives
10
Figure 10: AP-125 Right view
15
Figure 11: AP-125 Top view
15
3.3 Modes of Operation
17
3.4 Operational Environment
21
3.5 Logical Interfaces
22
4.1 Roles
23
4.1.2 User Authentication
24
4.2 Services
26
4.2.2 User Services
27
5 Cryptographic Algorithms
30
7 Self Tests
35
Comentários a estes Manuais
Sem comentários
Publish
Imprimir documento
Imprimir página 33
Comentários a estes Manuais