CISCO Embedded Wireless Controller Catalyst Access Points User Guide
- June 15, 2024
- Cisco
Table of Contents
Embedded Wireless Controller Catalyst Access Points
User Guide
Embedded Wireless Controller Catalyst Access Points
Support for Hash-to-Element for Password Element in SAE Authentication
- Hash-to-Element (H2E), on page 1
- YANG (RPC model), on page 1
- Configuring WPA3 SAE H2E, on page 2
- Verifying WPA3 SAE H2E Support in WLAN, on page 4
Hash-to-Element (H2E)
Hash-to-Element (H2E) is a new SAE Password Element (PWE) method. In this
method, the secret PWE used in the SAE protocol is generated from a password.
When a STA that supports H2E initiates SAE with an AP, it checks whether AP
supports H2E. If yes, the AP uses the H2E to derive the PWE by using a newly
defined Status Code value in the SAE Commit message.
If STA uses Hunting-and-Pecking, the entire SAE exchange remains unchanged.
While using the H2E, the PWE derivation is divided into the following
components:
- Derivation of a secret intermediary element PT from the password. This can be performed offline when the password is initially configured on the device for each supported group.
- Derivation of the PWE from the stored PT. This depends on the negotiated group and MAC addresses of peers. This is performed in real-time during the SAE exchange.
Note
- The H2E method also incorporates protection against the Group Downgrade man-in-the-middle attacks. During the SAE exchange, the peers exchange lists of rejected groups banded into the PMK derivation. Each peer compares the received list with the list of groups supported, any discrepancy detects a downgrade attack and terminates the authentication.
YANG (RPC model)
To create an RPC for SAE Password Element (PWE) mode, use the following RPC
model:
Note
The delete operation performs one action at a time due to the current infra limitation. That is, in YANG module, the delete operation on multiple nodes are not supported.
Configuring WPA3 SAE H2E
Procedure | Command or Action | Purpose |
---|---|---|
Step 1 | configure terminal |
Example:
Device# configure terminal| Enters global configuration mode.
Step 2| wan wan-name waned SSID-name Example:
Device(config)# wan WPA3 1 WPA3| Enters the WLAN configuration sub-mode.
Step 3| no security wpa akm dot1x
Example:
Device(config-wlan)# no security wpaakm dot1x| Disables security AKM for
dot1x.
Step 4| no security ft over-the-ds Example:
Device(config-wlan)# no security ft over-the-ds| Disables fast transition over
the data source on the WLAN.
Step 5| no security ft Example:
Device(config-wlan)# no security ft| Disables 802.11r fast transition on the
WLAN.
Step 6| no security wpa wpa2 Example:
Device(config-wlan)# no security wpa wpa2| Disables WPA2 security. PMF is
disabled now.
Step 7| security wpa wpa2 ciphers aes
Example:
Device(config-wlan)# security wpa wpa2 ciphers aes| Configures WPA2 cipher.
Note You can check whether cipher is configured using no security wpa wpa2
ciphers aes command. If cipher is not reset, configure the
cipher.
Step 8| security wpa psk set-key ascii value preshared-key Example:
Device(config-wlan)# security wpa psk set-key ascii 0 Cisco123| Specifies a
presaged key.
Step 9| security wpa wpa3 Example:
Device(config-wlan)# security wpa wpa3| Enables WPA3 support.
Step 10| security wpa akm sae Example:
Device(config-wlan)# security wpa akm sae| Enables AKM SAE support.
Step 11| security wpa akm sae pwe {h2e | hnp | both-h2e-hnp}
Example:
Device(config-wlan)# security wpa akm sae pwe| Enables AKM SAE PWE support.
PWE supports the following options:
• h2e—Hash-to-Element only; disables Hnp.
• hnp—Hunting and Pecking only; disables H2E.
• Both-h2e-hnp—Both Hash-to-Element and Hunting and Pecking support (Is the
default option).
Step 12| no shutdown Example:
Device(config-wlan)# no shutdown| Enables the WLAN.
Step 13| end Example:
Device(config-wlan)# end| Returns to the privileged EXEC mode.
Verifying WPA3 SAE H2E Support in WLAN
To view the WLAN properties (PWE method) based on the WLAN ID, use the following command:
To verify the client association who have used the PWE method as H2E or Hnp, use the following command:
To view the number of SAE authentications using the H2E and HnP, use the following command:
Support for Hash-to-Element for Password Element in SAE Authentication
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>