<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WPA + TKIP end of support in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706273#M21786</link>
    <description>&lt;P&gt;The issue with WPA/TKIP is that client will not be able to connect using 802.11ac as WPA2/AES is a requirement. When migrating off WPA/TKIP to WPA2/AES, you don’t just add this to an existing wlan, but in stead you create a new WLAN that has the same SSID, but a different WLAN profile name. Then you start to migrate devices that support WPA2/AES to that new SSID.&lt;/P&gt;
&lt;P&gt;Problem with adding WPA2/AES or just changing what was there is that clients will end up failing because it can only perform one type of encryption. &amp;nbsp;Since the customer devices already is using WPA/TKIP you need to not introduce AES.&lt;/P&gt;
&lt;P&gt;If the devices don’t connect to WPA/TKIP after an upgrade, then this should of been tested out prior and called out as a risk. Older devices that are in production have a risk of not working well with upgraded code or equipment because at times “something” changes. This is why updating device drivers are important when moving away from old wireless hardware to new.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your best bet is to create a new wlan, make sure the drivers in like laptops and or other devices are the latest or callmout the risk and migrate to WPA2/AES.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Sep 2018 13:30:44 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2018-09-13T13:30:44Z</dc:date>
    <item>
      <title>WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705711#M21781</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My client cannot have his TKIP clients work on 2802 APs on an SSID configured with WPA+tkip and WPA2 + AES, even though the documentation says they should.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We found a workaround but I was wondering when I could tell the client that these old protocols would not be supported any more (as we could not have them work anyway on these APs) by Cisco.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you happen to have any information on this ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anne&lt;BR /&gt;Technical Support&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 16:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705711#M21781</guid>
      <dc:creator>liboucher</dc:creator>
      <dc:date>2021-07-05T16:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705864#M21782</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;See below&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_cisco_aironet_series_2800_3800_access_point_deployment_guide/b_cisco_aironet_series_2800_3800_access_point_deployment_guide_chapter_01100.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_cisco_aironet_series_2800_3800_access_point_deployment_guide/b_cisco_aironet_series_2800_3800_access_point_deployment_guide_chapter_01100.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Does this product support TKIP?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers should be discouraged from running legacy TKIP as that feature has been deprecated by the Wi-Fi Alliance. Cisco understands there are healthcare customers using legacy equipment with a need for TKIP support. The 1830, 1850, 2800 and 3800 does not currently support TKIP but there are plans to support it in the 8.3MR1 release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;
&lt;P&gt;*** Pls rate all useful responses ***&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 20:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705864#M21782</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2018-09-12T20:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705901#M21783</link>
      <description>If you've got ISE then try Private PSK.</description>
      <pubDate>Wed, 12 Sep 2018 22:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3705901#M21783</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2018-09-12T22:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706072#M21784</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Thank you both for your answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had read your response, Rasika before, when I looked for information about this and upgrade my client's controller to v 8.3.141. (I am a fan of your blog by the way &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; ).. But it is not working better....&lt;/P&gt;
&lt;P&gt;It might be due to 802.1x used on the SSID, as Leo suggested I will test in lab with PSK instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was wondering, when on the documentation, it is written:&lt;/P&gt;
&lt;TABLE class="olh_note" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="olh_note" width="1%"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD class="olh_note"&gt;
&lt;DIV class="note__content"&gt;WPA +TKIP and TKIP + AES protocols are supported.&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;Does it mean WPA + TKIP alone on the SSID should work or that I compulsory need to have WPA+TKIP+WPA2+AES&amp;nbsp; on the SSID ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anne&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 08:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706072#M21784</guid>
      <dc:creator>liboucher</dc:creator>
      <dc:date>2018-09-13T08:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706156#M21785</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290124"&gt;@liboucher&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;as Leo suggested I will test in lab with PSK instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;It's &lt;STRONG&gt;Private&lt;/STRONG&gt; &lt;STRONG&gt;PSK&lt;/STRONG&gt; (and not just "PSK").&amp;nbsp; It's a new standard and feature.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 11:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706156#M21785</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2018-09-13T11:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: WPA + TKIP end of support</title>
      <link>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706273#M21786</link>
      <description>&lt;P&gt;The issue with WPA/TKIP is that client will not be able to connect using 802.11ac as WPA2/AES is a requirement. When migrating off WPA/TKIP to WPA2/AES, you don’t just add this to an existing wlan, but in stead you create a new WLAN that has the same SSID, but a different WLAN profile name. Then you start to migrate devices that support WPA2/AES to that new SSID.&lt;/P&gt;
&lt;P&gt;Problem with adding WPA2/AES or just changing what was there is that clients will end up failing because it can only perform one type of encryption. &amp;nbsp;Since the customer devices already is using WPA/TKIP you need to not introduce AES.&lt;/P&gt;
&lt;P&gt;If the devices don’t connect to WPA/TKIP after an upgrade, then this should of been tested out prior and called out as a risk. Older devices that are in production have a risk of not working well with upgraded code or equipment because at times “something” changes. This is why updating device drivers are important when moving away from old wireless hardware to new.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your best bet is to create a new wlan, make sure the drivers in like laptops and or other devices are the latest or callmout the risk and migrate to WPA2/AES.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 13:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wpa-tkip-end-of-support/m-p/3706273#M21786</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2018-09-13T13:30:44Z</dc:date>
    </item>
  </channel>
</rss>

