Static WEP uses a shared key to authenticate users and encrypt service packets. Since the shared key is easy to be deciphered, the WEP security policy is not recommended due to its low security. When configuring static WEP, you are advised to enable detection of brute force key cracking attacks. For details, see Configuring WIDS Attack Detection and a Dynamic Blacklist.
The WEP encryption algorithm is insecure. WPA2 is recommended in scenarios that have high security requirements.
The system view is displayed.
The WLAN view is displayed.
The security profile view is displayed.
The security policy is set to static WEP.
By default, the security policy is open system.
When the share-key parameter is present, WEP uses the configured shared key to authenticate wireless terminals and encrypt service packets. If the parameter is not present, WEP only encrypts the service packets. A shared key is configured on the wireless terminals regardless of whether the parameter is present.
Each AP can have at most four key indexes configured. The key indexes used by different VAPs cannot be the same.
The static WEP shared key and key index are configured.
By default, WEP-40 is used, and the key is Admin.
The index of the shared key used by WEP is configured.
By default, key 0 is used for WEP authentication or encryption.
Four shared keys can be configured for WEP. You can run the command to make the key with the specified index to take effect. The key index ID of the device starts from 0.
After an SSID of a WLAN is scanned, users cannot access the network by clicking or double-clicking the SSID on some terminals due to default terminal settings. In this situation, manually create a WLAN on the terminals, enter the SSID, identity authentication and encryption modes, key, and key index configured on the device. After that, users can connect to the WLAN through the terminals. The key index on some terminals starts from 1 and ranges from 1 to 4. The key indexes configured on the terminal must map those configured on the device in an ascending order. For example, if the key index 0 takes effect on the device, the key index should be set to 1 on the terminal.