Enterasys Networks 802.11 Network Card User Manual


 
2-17
Security
2. The key period expires. The AP creates two new random keys and loads them into the
inactive authenticator key indexes (Keys 3 and 4 in this example). The keys are not yet
used for transmission or reception.
3. The AP begins transmitting the new key pair to the authenticated clients in the
supplicant list. When a client receives the new keys, it immediately begins transmitting
using the new TX key. The AP does not use the new TX key until the message has been
transmitted to all clients. During this time, the AP accepts transmissions on both the
old and new RX keys. Note that a client can only have one TX key. The following table
shows that some clients use Key1 as the TX key while other clients use Key 3.
AP Client
Key # Encryption TX/RX State TX/RX Encryption
Key1 aaaaaaaaaaaaaa RX Active TX aaaaaaaaaaaaaa
Key2 bbbbbbbbbbbbb TX Active RX bbbbbbbbbbbbb
Key3 cccccccccccccc Inactive xxxxxxxxxxxxx
Key4 ddddddddddddd Inactive xxxxxxxxxxxxx
AP Client
Key # Encryption TX/RX State TX/RX Encryption
Key1 aaaaaaaaaaaaaa RX Active TX aaaaaaaaaaaaaa
Key2 bbbbbbbbbbbbb TX Active RX bbbbbbbbbbbbb
Key3 cccccccccccccc RX Active TX cccccccccccccc
Key4 ddddddddddddd Inactive ddddddddddddd