Dell PowerConnect W-AirWave 7.5 | Configuration Guide Configuration Reference | 51Dynamic WEP KeyMessage Retry Count(1-3)1 Define the number of times that failed authentication with a WEP key should be allowedto retry authentication. The range is from 0 to 3 attempts.A primary means of cracking WEP keys is to capture 802.11 frames over an extendedperiod of time and searching for such weak implementations that are still used by manylegacy devices.Dynamic WEP Key Size(bits)128 Specify the maximum size of the WEP key in bits. The options are 40 or 128.Interval Between WPA/WPA2 Key Messages(10-5000 msec)1000 Specify the key message interval in milliseconds.Display Between EAP-Success and WPA2Unicast Key Exchange(0-2000 msec)0 Define EAP for RADIUS server authentication.802.1x uses the Extensible Authentication Protocol (EAP) to exchange messages duringthe authentication process. The authentication protocols that operate inside the 802.1xframework that are suitable for wireless networks include EAP-Transport Layer Security(EAP-TLS), Protected EAP (PEAP), and EAP-Tunneled TLS (EAP-TTLS). These protocolsallow the network to authenticate the client while also allowing the client toauthenticate the network.Delay between WPA/WPA2 Unicast KeyExchange(0-2000 msec)0 Specify the delay between processing these two key times during authentication.WPA/WPA2 KeyMessage Retry Count(1-10)3 Specify the number of times that WPA or WPA2 keys are allowed to retry. The supportedrange is from 1 to 10.Multicast Key Rotation No Enable or disable multicast key rotation, and define the related settings on this page formulticast key rotation time and interval if this field is enabled.Unicast Key Rotation No Enable or disable unicast key rotation, and define the related settings on this page forunicast key rotation time and interval if t his field is enabled.Reauthentication No Enable or disable reauthentication. Although reauthentication and rekey timers areconfigurable on a per-SSID basis, an 802.1x transaction during a call can affect voicequality. If a client is on a call, 802.1x reauthentication and rekey are disabled by defaultuntil the call is completed. You disable or re-enable the “voice aware” feature in the802.1x authentication profile.Opportunistic KeyCachingYes Enable or disable opportunistic key caching (also configured in the 802.1xAuthentication profile). This supports WPA2 clients.Validate PMKID No Define whether PMKID authentication should be validated.Use Session Key No Specify whether a client session should use a security key.Use Static Key No The IEEE 802.1x authentication standard allows for the use of keys that are dynamicallygenerated on a per-client basis, or as a static key that is the same on all devices in thenetwork). Define whether to use a static key with this setting.xSec MTU(1024 - 1500 Bytes)1300 bytes Define the maximum transmission unit size in bytes.Termination No Select this option to terminate 802.1x authentication on the controller.Termination EAP-TypeTLSNo Specify if the EAP termination type is TLS.Table 10 Profiles > AAA > 802.1x Auth Profile Settings (Continued)Field Default Description