Avalanche User Guide - Wavelink
Avalanche User Guide - Wavelink Avalanche User Guide - Wavelink
Chapter 6: Managing Network Profiles 56WEP Key Rotation. WEP key rotation employs four keys which areautomatically rotated at specified intervals. Each time the keys are rotated,one key is replaced by a new, randomly generated key. The keys are alsostaggered, meaning that the key sent by an infrastructure device is differentthan the one sent by a mobile device. Because both infrastructure and mobiledevices know which keys are authorized, they can communicate securelywithout using a shared key.WEP key rotation settings are not recoverable. If the system hosting theServer becomes unavailable (for example, due to a hardware crash), you mustre-connect serially to each mobile device to ensure that WEP key settings arecorrectly synchronized.WPA (TKIP). WPA, or Wi-Fi Protected Access, uses Temporal Key IntegrityProtocol (TKIP) to encrypt information and change the encryption keys asthe system is used. WPA uses a larger key and a message integrity check tomake the encryption more secure than WEP. In addition, WPA is designed toshut down the network for 60 seconds when an attempt to break theencryption is detected. WPA availability is dependent on some hardwaretypes.WPA2 (AES). WPA2 is similar to WPA but meets even higher standards forencryption security. In WPA2, encryption, key management, and messageintegrity are handled by CCMP (Counter Mode with Cipher Block ChainingMessage Authentication Code Protocol) instead of TKIP. WPA2 availability isdependent on some hardware types.WPA2 Mixed Mode. WPA Mixed Mode allows you to use either AES orTKIP encryption, depending on what the device supports.CustomPropertiesThis option allows you to add custom properties to the devices that receivethis network profile. By clicking Edit/View, you can add, edit, and deleteproperties and their values.AuthenticationSettingsThe authentication types available depends on the encryption you select andwhat is supported by your Enabler and hardware. Authentication optionsinclude:EAP. Extensible Authentication Protocol. Avalanche supports five differentEAP methods:
Chapter 6: Managing Network Profiles 57PEAP/MS-CHAPv2. (Protected Extensible Authentication Protocol combinedwith Microsoft Challenge Handshake Authentication Protocol)PEAP/MS-CHAPv2 is available when you are using encryption. It uses apublic key certificate to establish a Transport Layer Security tunnel betweenthe client and the authentication server.PEAP/GTC. (Protected Extensible Authentication Protocol with GenericToken Card) PEAP/GTC is available when you are using encryption. It issimilar to PEAP/MS-CHAPv2, but uses an inner authentication protocolinstead of MS-CHAP.EAP_FAST/MS-CHAPv2.(Extensible Authentication Protocol - FlexibleAuthentication via Secure Tunneling combined with MS-CHAPv2)EAP-FAST uses protected access credentials and optional certificates toestablish a Transport Layer Security tunnel.EAP_FAST/GTC. (Extensible Authentication Protocol - FlexibleAuthentication via Secure Tunneling with Generic Token Card) EAP-FASTuses protected access credentials and optional certificates to establish aTransport Layer Security tunnel.TTLS/MS-CHAPv2. (Tunneled Transport Layer Security with MS-CHAPv2)TTLS uses public key infrastructure certificates (only on the server) toestablish a Transport Layer Security tunnel.Pre-Shared Key (PSK). PSK does not require an authentication server. Apreset authentication key (either a 8-63 character pass phrase or a 64character hex key) is shared to the devices on your network and allows themto communicate with each other.LEAP. (Lightweight Extensible Authentication Protocol) LEAP requires bothclient and server to authenticate and then creates a dynamic WEP key.To configure WLAN settings:1 From the Profiles tab, select the profile from the Profile List.2 Click Edit.3 In the Network Profile tab, enable the Manage WLAN option.4 In the Scheduled Settings region, select the date and time you want the settings to takeeffect from the drop-down list.• If you would like to add another start time for different settings to the list, click Addand select the date and time you want it to begin.
- Page 13 and 14: Chapter 1: Introduction 5• You ha
- Page 15 and 16: Chapter 2: Licensing 7When you run
- Page 17 and 18: Chapter 2: Licensing 93 Click Activ
- Page 19 and 20: Chapter 2: Licensing 11Running the
- Page 21 and 22: Chapter 3: Avalanche Java Console 1
- Page 23 and 24: Chapter 3: Avalanche Java Console 1
- Page 25 and 26: Chapter 3: Avalanche Java Console 1
- Page 27 and 28: Chapter 3: Avalanche Java Console 1
- Page 29 and 30: Chapter 3: Avalanche Java Console 2
- Page 31 and 32: Chapter 3: Avalanche Java Console 2
- Page 33 and 34: Chapter 3: Avalanche Java Console 2
- Page 35 and 36: Chapter 3: Avalanche Java Console 2
- Page 37 and 38: Chapter 3: Avalanche Java Console 2
- Page 39 and 40: Chapter 3: Avalanche Java Console 3
- Page 41 and 42: Chapter 3: Avalanche Java Console 3
- Page 43 and 44: Chapter 4: Managing User Accounts 3
- Page 45 and 46: Chapter 4: Managing User Accounts 3
- Page 47 and 48: Chapter 4: Managing User Accounts 3
- Page 49 and 50: Chapter 4: Managing User Accounts 4
- Page 51 and 52: Chapter 4: Managing User Accounts 4
- Page 53 and 54: Chapter 5: Location Management 45Ch
- Page 55 and 56: Chapter 5: Location Management 47
- Page 57 and 58: Chapter 5: Location Management 496
- Page 59 and 60: Chapter 6: Managing Network Profile
- Page 61 and 62: Chapter 6: Managing Network Profile
- Page 63: Chapter 6: Managing Network Profile
- Page 67 and 68: Chapter 6: Managing Network Profile
- Page 69 and 70: Chapter 7: Managing Scan to Configu
- Page 71 and 72: Chapter 7: Managing Scan to Configu
- Page 73 and 74: Chapter 7: Managing Scan to Configu
- Page 75 and 76: Chapter 8: Managing a Mobile Device
- Page 77 and 78: Chapter 8: Managing a Mobile Device
- Page 79 and 80: Chapter 8: Managing a Mobile Device
- Page 81 and 82: Chapter 8: Managing a Mobile Device
- Page 83 and 84: Chapter 8: Managing a Mobile Device
- Page 85 and 86: Chapter 9: Managing Software Profil
- Page 87 and 88: Chapter 9: Managing Software Profil
- Page 89 and 90: Chapter 9: Managing Software Profil
- Page 91 and 92: Chapter 9: Managing Software Profil
- Page 93 and 94: Chapter 9: Managing Software Profil
- Page 95 and 96: Chapter 9: Managing Software Profil
- Page 97 and 98: Chapter 10: Managing Mobile Devices
- Page 99 and 100: Chapter 10: Managing Mobile Devices
- Page 101 and 102: Chapter 10: Managing Mobile Devices
- Page 103 and 104: Chapter 10: Managing Mobile Devices
- Page 105 and 106: Chapter 10: Managing Mobile Devices
- Page 107 and 108: Chapter 10: Managing Mobile Devices
- Page 109 and 110: Chapter 11: Using Remote Control 10
- Page 111 and 112: 103Changing the Username and Passwo
- Page 113 and 114: 105Debug MailSessionEnables or disa
Chapter 6: Managing Network Profiles 56WEP Key Rotation. WEP key rotation employs four keys which areautomatically rotated at specified intervals. Each time the keys are rotated,one key is replaced by a new, randomly generated key. The keys are alsostaggered, meaning that the key sent by an infrastructure device is differentthan the one sent by a mobile device. Because both infrastructure and mobiledevices know which keys are authorized, they can communicate securelywithout using a shared key.WEP key rotation settings are not recoverable. If the system hosting theServer becomes unavailable (for example, due to a hardware crash), you mustre-connect serially to each mobile device to ensure that WEP key settings arecorrectly synchronized.WPA (TKIP). WPA, or Wi-Fi Protected Access, uses Temporal Key IntegrityProtocol (TKIP) to encrypt information and change the encryption keys asthe system is used. WPA uses a larger key and a message integrity check tomake the encryption more secure than WEP. In addition, WPA is designed toshut down the network for 60 seconds when an attempt to break theencryption is detected. WPA availability is dependent on some hardwaretypes.WPA2 (AES). WPA2 is similar to WPA but meets even higher standards forencryption security. In WPA2, encryption, key management, and messageintegrity are handled by CCMP (Counter Mode with Cipher Block ChainingMessage Authentication Code Protocol) instead of TKIP. WPA2 availability isdependent on some hardware types.WPA2 Mixed Mode. WPA Mixed Mode allows you to use either AES orTKIP encryption, depending on what the device supports.CustomPropertiesThis option allows you to add custom properties to the devices that receivethis network profile. By clicking Edit/View, you can add, edit, and deleteproperties and their values.AuthenticationSettingsThe authentication types available depends on the encryption you select andwhat is supported by your Enabler and hardware. Authentication optionsinclude:EAP. Extensible Authentication Protocol. <strong>Avalanche</strong> supports five differentEAP methods: