Many
Manuals
search
Categorias
Marcas
Inicio
Aruba
Puntos de acceso wlan
800 Series
Manual de usuario
Aruba 800 Series Manual de usuario Pagina 33
Descarga
Compartir
Compartiendo
Añadir a mis manuales
Imprimir
Pagina
/
36
Tabla de contenidos
MARCADORES
Valorado
.
/ 5. Basado en
revisión del cliente
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
33
CSP
CSP TYPE
GENERATION
STORAGE
And
ZEROIZATI
ON
USE
WPA2 PSK
16
-
64
character
shared secret
used to
authenticate
mesh
connections
and in
remote AP
advanced
configuration
CO configured
Encrypted in
flash using the
KEK; zeroized
by updating
through
administrative
in
terface, or b
y
the ‘ap wipe
out flash’
command.
Used to derive
the PMK for
802.11i mesh
connections
between APs
and in
advanced
Remote AP
connections;
programmed
into AP by the
controller over
the IPSec
session.
802.11i P
airwis
e Ma
ster
Key (PMK)
512
-bit
shared secret
used to
derive
802.11i
session keys
Derived from WPA2
PSK
In volatile
memory only;
zeroized o
n
reboot
Used to derive
802.11i
Pairwise
Transient Key
(PTK)
802.11i P
airwis
e T
ransient
Key (PTK)
512
-bit
shared secret
from which
Temporal
Keys (TKs)
are derived
Derived during 802.
11i
4-way handshake
In volatile
memory only;
zeroized o
n
reboot
All session
encryption/dec
ryption keys
are derived
from the PT
K
802.11i
EAPOL MIC Key
128
-bit
shared secret
used to
protect 4
-
way (key)
handshake
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
integrity
validation in 4-
way
handshake
802.11i EAPOL Encr Ke
y
128
-bit
shared secret
used to
protect 4
-
way
handshakes
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
confidentiality
in 4-way
handshake
802.11i data
AES-CCM
encryption/MIC key
128
-bit AES-
CCM key
Derived from PT
K
Stored in
plaintext in
volatile
memory;
zeroized o
n
reboot
Used for
802.11i pac
ket
encryption and
integrity
verification
(this is the
CCMP or
AES-CCM
key)
1
2
...
28
29
30
31
32
33
34
35
36
Wireless Access Points
1
1 Introduction
5
2 Product Overview
7
3 Module Objectives
10
Figure 10: AP-125 Right view
15
Figure 11: AP-125 Top view
15
3.3 Modes of Operation
17
3.4 Operational Environment
21
3.5 Logical Interfaces
22
4.1 Roles
23
4.1.2 User Authentication
24
4.2 Services
26
4.2.2 User Services
27
5 Cryptographic Algorithms
30
7 Self Tests
35
Comentarios a estos manuales
Sin comentarios
Publish
Imprimir documento
Imprimir pagina 33
Comentarios a estos manuales