04.01.2015 Views

Wireles Networks The Definitive Guide.pdf - Csbdu.in

Wireles Networks The Definitive Guide.pdf - Csbdu.in

Wireles Networks The Definitive Guide.pdf - Csbdu.in

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A.2.2 Authentication Algorithms Table<br />

<strong>The</strong> authentication algorithms table reports on which authentication algorithms are supported by the<br />

station on each <strong>in</strong>terface. It is best thought of as the three-dimensional array shown <strong>in</strong> Figure A-4.<br />

Figure A-4. <strong>The</strong> authentication algorithms table<br />

In addition to the ifIndex <strong>in</strong>dex variable, an auxiliary <strong>in</strong>dex variable is used. <strong>The</strong> reason for the<br />

auxiliary variable is that multiple authentication algorithms exist, and the table should report on all of<br />

them. For each <strong>in</strong>dex, the auxiliary <strong>in</strong>dex allows several cells to report on one authentication algorithm<br />

each. Each cell has two component objects:<br />

dot11AuthenticationAlgorithm (enumerated type)<br />

This object is set either to openSystem (1) or sharedKey (2) to report on the authentication<br />

algorithm.<br />

dot11AuthenticationAlgorithmsEnable (TruthValue)<br />

This object reflects whether the correspond<strong>in</strong>g authentication algorithm noted by the previous<br />

object is supported by the <strong>in</strong>terface that <strong>in</strong>dexes the table. By default, it is set to true (1) for<br />

open-system authentication and false (2) for shared-key authentication.<br />

A.2.3 WEP Key Tables<br />

Two tables report on the status of WEP key <strong>in</strong>formation. Both use the WEPKeytype def<strong>in</strong>ed data type,<br />

which is simply a 40-bit str<strong>in</strong>g. <strong>The</strong> WEP key tables are shown <strong>in</strong> Figure A-5. WEP key tables are<br />

supposed to be write-only, but a security advisory was issued <strong>in</strong> June 2001 aga<strong>in</strong>st one vendor who<br />

exposed the keys to queries us<strong>in</strong>g SNMP.<br />

Figure A-5. WEP key tables<br />

A.2.3.1 WEP default key table<br />

<strong>The</strong> default key table is quite simple. Each <strong>in</strong>terface has a maximum of four default keys associated<br />

with it because the WEP specification allows for four default keys per network. When transmitted <strong>in</strong><br />

frames over the air, the WEP key ID for the default key runs from 0-3. In this table, however, the<br />

<strong>in</strong>dex runs from 1-4. Each cell <strong>in</strong> the table has just one object:<br />

316

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!