WPA-Rekeying-Cycle

Enter at which intervals the device repeats the WPA key handshake.

For WPA1/2, authentication on a network is performed with a pre-shared key (PSK), which is part of a 128-bit individual key. The device (as authenticator) generates this key with a 48-bit initial vector (IV), which makes it difficult for attackers to calculate the WPA key. The repetition of the key that consists of the IV and WPA keys only occurs after 248 data packets, which no WLAN will reach within a foreseeable time.

To prevent the (theoretical) repetition of the real key, the WPA allows for an automatic renegotiation of the key with the WLAN client (the supplicant) in regular intervals (rekeying). This prevents the repetition of the real key. By setting an individual cycle, you have the option of shortening the rekeying intervals.

SNMP ID:
2.23.20.20.11 
Telnet path:
Setup > Interfaces > WLAN > Interpoint-Encryption
Possible values:

0 … 4294967295 Seconds

Special values:
0
This value disables the preliminary negotiation of a new WPA key at the device. Rekeying can still be triggered by the supplicant.
Default:
0

www.lancom-systems.com

LANCOM Systems GmbH | Adenauerstr. 20/B2 | 52146 Wuerselen | Germany | E-Mail info@lancom.de

LANCOM Logo