Our 340 and 350 series wireless products will support per user (session) WEP
key assignment if you use the wireless products in conjunction with Cisco
Secure ACS v2.6 which supports LEAP.  LEAP allows the AP to query the Cisco
Secure ACS Server for user authentication and WEP key assignment.  In this
configuration each wireless user on the network has their own unique WEP key
negating the requirement for a "shared" WEP key.

The 350 series products support line power from Catalyst switches and also
have 100mW radios that are more sensitive than those in the 340.  You will
have to upgrade firmware in the 340 series Access Points and NICs to support
the new security functionality.  Encryption also runs in hardware on both
the 340 and 350 series products so we don't impact the system CPU...

Chris Lemagie


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Craig Lindstrom
Sent: Friday, February 23, 2001 9:03 AM
To: '[EMAIL PROTECTED]'
Subject: RE: 128 WEP Vulnerabilities


I just got an announcement from cisco that said the aironet 350 series will
use dynamic wep encryption keys instead of the manually entered one,  I
think the key can be created per wireless session(not ip session).  That
should greatly enhance the security.

Craig

-----Original Message-----
From: Nabil Fares [mailto:[EMAIL PROTECTED]]
Sent: Friday, February 23, 2001 8:58 AM
To: [EMAIL PROTECTED]
Subject: 128 WEP Vulnerabilities


Greeting all,

Are you guys aware of any issues/vulnerabilities with the WEP protocol.  Any
feedback greatly appreciated.

Nabil

_________________________________
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_________________________________
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to