No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Fat AP and Cloud AP V200R010C00 Command Reference

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
security wep

security wep


The security wep command configures the WEP authentication mode.

The undo security command restores the default security policy.

By default, the security policy is open system.


security open

security wep [ share-key | dynamic ]

undo security





security open

Sets the WEP authentication mode to open authentication.


security wep

Sets the WEP authentication mode to share-key authentication.


security wep share-key

When the WEP authentication mode is set to shared-key authentication:
  • If the parameter is present, WEP uses the configured shared key to authenticate wireless terminals and encrypt service packets.
  • If the parameter is not present, WEP only uses the configured shared key to encrypt the service packets.

A shared key is configured on the wireless terminals regardless of whether the parameter is present.


security wep dynamic

Sets the WEP authentication mode to dynamic WEP.



Security profile view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

You can select security policies on a WLAN based on the security level. WEP is a security policy used earlier and has security risks. It can be used in open scenarios that do not require high security.

Table 22-41  Comparing authentication modes


Link Authentication Mode

Encryption Mode



security open

open Not encrypted

Wireless devices can connect to a network without authentication.

STA identities are not checked, bringing security risks.

Service data is not WEP-encrypted.

security wep

open Static WEP encryption

Service data is WEP-encrypted.

STA identities are not checked, bringing security risks.

security wep share-key

Shared key authentication Static WEP encryption

A shared key is used to enhance security.

Service data is WEP-encrypted.

  • A long key string must be configured on each device and is difficult to expand.
  • A static key is used, which is easy to decipher.

security wep dynamic

open Dynamic WEP encryption

Dynamic WEP encryption for service data provides higher security.

802.1X authentication is also required. The configuration is complex.


  • If the security wep [ share-key ] command is executed, you can run the wep key command to configure the pre-shared key. Otherwise, the default pre-shared key is used.
  • If the security open command is executed, you do not need to configure the pre-shared key. The configured pre-shared key will not take effect.
  • If the security wep dynamic command is executed to configure dynamic WEP, you also need to configure 802.1X authentication. Otherwise, dynamic WEP does not take effect.

  • Each AP can have at most four key indexes configured. The key indexes used by different VAPs cannot be the same.

  • The system displays the message "Warning:" only when the security profile has been bound to the other profiles.

  • If WEP shared key authentication mode is configured, the access of non-HT STAs fails to be denied.
  • APs in compliance with 802.11ac Wave 2 support dynamic WEP.

  • Mobile phones do not support dynamic WEP.

  • RUs do not support dynamic WEP.


# Create security profile p1 and set the authentication mode to share-key.

<Huawei> system-view
[Huawei] wlan
[Huawei-wlan-view] security-profile name p1
[Huawei-wlan-sec-prof-p1] security wep share-key
Warning:  If the wmm disable command, TKIP, WEP, or radio type of 802.11a/b/g is configured, the function of denying access of legacy STAs cannot take effect. 
Related Topics
Updated: 2019-11-21

Document ID: EDOC1100064352

Views: 201217

Downloads: 122

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next