Many
Manuals
search
Kategorien
Marken
Startseite
Aruba
WLAN-Zugangspunkte
800 Series
Bedienungsanleitung
Aruba 800 Series Bedienungsanleitung Seite 33
Herunterladen
Teilen
Teilen
Zu meinen Handbüchern hinzufügen
Drucken
Seite
/
36
Inhaltsverzeichnis
LESEZEICHEN
Bewertet
.
/ 5. Basierend auf
Kundenbewertungen
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
33
CSP
CSP TYPE
GENERATION
STORAGE
And
ZEROIZATI
ON
USE
WPA2 PSK
16
-
64
character
shared secret
used to
authenticate
mesh
connections
and in
remote AP
advanced
configuration
CO configured
Encrypted in
flash using the
KEK; zeroized
by updating
through
administrative
in
terface, or b
y
the ‘ap wipe
out flash’
command.
Used to derive
the PMK for
802.11i mesh
connections
between APs
and in
advanced
Remote AP
connections;
programmed
into AP by the
controller over
the IPSec
session.
802.11i P
airwis
e Ma
ster
Key (PMK)
512
-bit
shared secret
used to
derive
802.11i
session keys
Derived from WPA2
PSK
In volatile
memory only;
zeroized o
n
reboot
Used to derive
802.11i
Pairwise
Transient Key
(PTK)
802.11i P
airwis
e T
ransient
Key (PTK)
512
-bit
shared secret
from which
Temporal
Keys (TKs)
are derived
Derived during 802.
11i
4-way handshake
In volatile
memory only;
zeroized o
n
reboot
All session
encryption/dec
ryption keys
are derived
from the PT
K
802.11i
EAPOL MIC Key
128
-bit
shared secret
used to
protect 4
-
way (key)
handshake
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
integrity
validation in 4-
way
handshake
802.11i EAPOL Encr Ke
y
128
-bit
shared secret
used to
protect 4
-
way
handshakes
Derived from PT
K
In volatile
memory only;
zeroized o
n
reboot
Used for
confidentiality
in 4-way
handshake
802.11i data
AES-CCM
encryption/MIC key
128
-bit AES-
CCM key
Derived from PT
K
Stored in
plaintext in
volatile
memory;
zeroized o
n
reboot
Used for
802.11i pac
ket
encryption and
integrity
verification
(this is the
CCMP or
AES-CCM
key)
1
2
...
28
29
30
31
32
33
34
35
36
Wireless Access Points
1
1 Introduction
5
2 Product Overview
7
3 Module Objectives
10
Figure 10: AP-125 Right view
15
Figure 11: AP-125 Top view
15
3.3 Modes of Operation
17
3.4 Operational Environment
21
3.5 Logical Interfaces
22
4.1 Roles
23
4.1.2 User Authentication
24
4.2 Services
26
4.2.2 User Services
27
5 Cryptographic Algorithms
30
7 Self Tests
35
Kommentare zu diesen Handbüchern
Keine Kommentare
Publish
Dokument drucken
Seite drucken 33
Kommentare zu diesen Handbüchern