Hi, understand that EAP generate dynamic WEP keys for individual client and sessions. Does that means that the same client firing an FTP session and Telnet session uses different WEP keys? Does the per session refers to source/destination IP as well as port numbers? Tks.
The WEP key is generated per session, per user. A new dynamic WEP key is generated by combining the Initial vector and the password of the user. The password is the password used to authenticate against the Domain Controller via the ACS 2.6 server using Cisco Aironet Radius. The WEP key can be set to have a time out, forcing a renegotation to happen. Visit the following link to review:
It is my understanding that it only takes two instances to determine a WEP key from the IV and the key. When two IVs are found a simple XOR is performed to determine the WEP key from the IV and the client key. The timeout of the WEP key is based on throughput. Once a threshold is met a key is renegotiated. There is a new IV per packet under this implmentation. I suspect that a pool of random numbers is being used (meaning you may have the same number more than once, nothing is truly random) This leads me to believe that a IV may be used for more than one user and therefore create a different dynamic WEP key and make it more difficult to crack.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...