Q:
What all encryption modes are supported by x86 based controllers?
In AOS 8.x, below SSID encryption methods can be used:
(x86) [mynode] (SSID Profile "Aruba") #opmode bSec-128 WPA2 with AES GCM-128 encryption and dynamic keys using 802.1X bSec-256 WPA2 with AES GCM-256 encryption and dynamic keys using 802.1X dynamic-wep WEP with dynamic keys opensystem No encryption static-wep WEP with static keys wpa-aes WPA with AES encryption and dynamic keys using 802.1X wpa-psk-aes WPA with AES encryption using a pre-shared key wpa-psk-tkip WPA with TKIP encryption using a pre-shared key wpa-tkip WPA with TKIP encryption and dynamic keys using 802.1X wpa2-aes WPA2 with AES encryption and dynamic keys using 802.1X wpa2-psk-aes WPA2 with AES encryption using a pre-shared key wpa2-psk-tkip WPA2 with TKIP encryption using a pre-shared key wpa2-tkip WPA2 with TKIP encryption and dynamic keys using 802.1X xSec xSec encryption
TKIP, however is not supported with x86 based platform (any OS installed on VM) with tunnel mode. TKIP will work in x86 platform if the forward mode of the Virtual AP is split-tunnel or bridge mode.
In any instance, there are VM based MM's and Hardware MD's, the configuration will be pushed down to the Hardware based devices so that TKIP works with the Hardware MD's in tunnel mode.
(x86) [mynode] (config) #show profile-errors Invalid Profiles ---------------- Profile Error ------- ----- wlan virtual-ap "TEST" Static/dynamic wep/wpa/tkip not allowed for forward-mode tunnel
© Copyright 2024 Hewlett Packard Enterprise Development LPAll Rights Reserved.