Cisco Systems WAP561AK9 Network Hardware User Manual


 
Wireless
Networks
Cisco Small Business WAP551 and WAP561 Wireless-N Access Point 79
5
- WPA2—If all client stations on the network support WPA2, we suggest
using WPA2 which provides the best security per the IEEE 802.11i
standard.
- WPA and WPA2—If you have a mix of clients, some of which support
WPA2 and others which support only the original WPA, select both WPA
and WPA2. This setting lets both WPA and WPA2 client stations
associate and authenticate, but uses the more robust WPA2 for clients
who support it. This WPA configuration allows more interoperability, in
place of some security.
Enable pre-authentication—If for WPA Versions you select only WPA2 or
both WPA and WPA2, you can enable pre-authentication for WPA2 clients.
Click Enable pre-authentication if you want WPA2 wireless clients to send
pre-authentication packets. The pre-authentication information is relayed
from the WAP device that the client is currently using to the target WAP
device. Enabling this feature can help speed up authentication for roaming
clients who connect to multiple APs.
This option does not apply if you selected WPA for WPA Versions because
the original WPA does not support this feature.
Cipher Suites—The cipher suite you want to use:
- TKIP
- CCMP (AES)
- TKIP and CCMP (AES)
By default both TKIP and CCMP are selected. When both TKIP and CCMP
are selected, client stations configured to use WPA with RADIUS must have
one of these addresses and keys:
- A valid TKIP RADIUS IP address and RADIUS Key
- A valid CCMP (AES) IP address and RADIUS Key
Use Global RADIUS Server Settings—By default, each VAP uses the
global RADIUS settings that you define for the WAP device (see RADIUS
Server). However, you can configure each VAP to use a different set of
RADIUS servers.
To use the global RADIUS server settings, make sure the check box is
selected.