security psk
Format
security { wpa | wpa2 | wpa-wpa2 } { ppsk | psk { pass-phrase | hex } key-value } { aes | tkip | aes-tkip }
security wpa-wpa2 { ppsk | psk { pass-phrase | hex } key-value } tkip aes
undo security
Parameters
Usage Guidelines
Application Scenario
WPA/WPA2 authentication includes WPA/WPA2 pre-shared key authentication and 802.1X authentication, which are also called WPA/WPA2 personal edition and WPA/WPA2 enterprise edition respectively. 802.1X authentication is of high security and is applicable to enterprise networks.
To access a WLAN device using WPA or WPA2 pre-shared key authentication, run the security psk command. If multiple types of user terminals are available, you can configure the WPA-WPA2 and AES-TKIP security policy for authentication and data encryption.
Configure PPSK authentication if STAs need to use different PSKs to access the network.
The security wpa-wpa2 psk { pass-phrase | hex } key-value tkip aes command indicates that WPA and WPA2 use TKIP and AES for data encryption, respectively.
Follow-up Procedure
If PPSK authentication is used, run the ppsk-user command to configure a PPSK user.
Precautions
If the key is in hexadecimal notation, you can enter hexadecimal characters without entering 0x.
If a security profile is bound to multiple VAP profiles, it will take a few minutes to configure WPA/WPA2 PSK authentication and encryption in the security profile.
The system displays the message only when the security profile has been bound to the other profiles.
If pre-shared key authentication and TKIP or AES-TKIP encryption for WPA/WPA2 is configured, the access of non-HT STAs fails to be denied.
If the password is changed to one starting or ending with a space on the device (for example, huawei123abc), some terminals (such as terminals running Windows 7) may filter out the space when you change the password on the terminals. This will lead to an association failure. Therefore, it is not recommended that a password starting or ending with a space be set on the device. If such a password has been configured on the device, delete the existing SSID on a terminal, reassociate the terminal with the SSID, and enter the password. For detailed terminal types, refer to the Test Report on Terminal Compatibility of Huawei's WLAN Products.
Example
# Configure WPA pre-shared key authentication and the authentication key.
<AC6605> system-view [AC6605] wlan [AC6605-wlan-view] security-profile name p1 [AC6605-wlan-sec-prof-p1] security wpa psk pass-phrase abcdfffffg123 aes
# Configure WPA2 pre-shared key authentication and the authentication key.
<AC6605> system-view [AC6605] wlan [AC6605-wlan-view] security-profile name p1 [AC6605-wlan-sec-prof-p1] security wpa2 psk pass-phrase abcdfffffg123 aes
<AC6605> system-view [AC6605] wlan [AC6605-wlan-view] security-profile name p1 [AC6605-wlan-sec-prof-p1] security wpa-wpa2 psk pass-phrase abcdfffffg123 aes-tkip Warning: If the wmm disable command, TKIP, WEP, or radio type of 802.11a/b/g is configured, the function of denying access of legacy STAs cannot take effect.
# Configure WPA/WPA2-PPSK authentication and TKIP-CCMP encryption.
<AC6605> system-view [AC6605] wlan [AC6605-wlan-view] security-profile name p1 [AC6605-wlan-sec-prof-p1] security wpa-wpa2 ppsk aes-tkip