They are similar in that they both use / permit key rotation and (in the case of WPA-PSK) both start with a "seed key" and ultimately generate dymanic keys.
WPA2 / 802.11i use AES for encryption, WEP with TKIP still uses RC4. RC4 was never intended for use with this type of encryption application. The original problem with WEP, what makes it weak by comparison (they way it was implemented for wireless), is that the initialization vectors are static.
The system was utilized such that it became easy to predict; by feeding it some known values and watching for an expected result, the encryption could be "figured out."
AES is much more recent, and does not have these weaknesses. WPA using TKIP does not have have these weaknesses.
The main weakness for WPA, specifically the PSK flavor, is if a weak key/passphrase is used (ones with "dictionary" words and/or short length).
WEP with TKIP is much more secure than plain old WEP, but it still has a few exploitations that do not exist with WPA with TKIP.
The primary difference is, I believe, how the encryption is initialized.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...