Security
SCPI Commands :
CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:ENCRyption
CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:PMF
CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:GTRansform
CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:HASHtoelem
- class SecurityCls[source]
Security commands group definition. 15 total commands, 6 Subgroups, 4 group commands
- get_encryption() EncryptionType [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:ENCRyption value: enums.EncryptionType = driver.configure.connection.security.get_encryption()
Sets the encryption type for AP operation mode, if WPA, WPA2, or WPA3 personal security mode is selected.
- return:
encryption_type: AES | TKIP | DISabled | GCMP AES: AES basd CCMP-128 with PSK (for WPA2) TKIP: TKIP with PSK (for WPA) DISabled: encryption not used GCMP: CCMP-128 with SAE and PMF (WPA3)
- get_gtransform() GroupTransform [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:GTRansform value: enums.GroupTransform = driver.configure.connection.security.get_gtransform()
Specifies the group transform for WPA3 personal security mode.
- return:
group_transform: ECP256 | ECP384 256-bit ECP or 384-bit ECP
- get_hashto_elem() HashMode [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:HASHtoelem value: enums.HashMode = driver.configure.connection.security.get_hashto_elem()
Selects authentication and key management mechanism supported by the R&S CMW:
- return:
mode: HUNT | H2E | BOTH HUNT: hunting-and-pecking negotiated in SAE exchange H2E:SAE hash-to-element is mandatory for WPA3 and for SAE in 6 GHz band BOTH: the R&S CMW supports both techniques
- get_pmf() Protection [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:PMF value: enums.Protection = driver.configure.connection.security.get_pmf()
Selects, whether the protection management frames are unsupported, supported or required. This parameter applies to WPA2, WPA3 in AP operation mode.
- return:
protection: UNSupported | SUPPorted | REQuired
- set_encryption(encryption_type: EncryptionType) None [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:ENCRyption driver.configure.connection.security.set_encryption(encryption_type = enums.EncryptionType.AES)
Sets the encryption type for AP operation mode, if WPA, WPA2, or WPA3 personal security mode is selected.
- param encryption_type:
AES | TKIP | DISabled | GCMP AES: AES basd CCMP-128 with PSK (for WPA2) TKIP: TKIP with PSK (for WPA) DISabled: encryption not used GCMP: CCMP-128 with SAE and PMF (WPA3)
- set_gtransform(group_transform: GroupTransform) None [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:GTRansform driver.configure.connection.security.set_gtransform(group_transform = enums.GroupTransform.ECP256)
Specifies the group transform for WPA3 personal security mode.
- param group_transform:
ECP256 | ECP384 256-bit ECP or 384-bit ECP
- set_hashto_elem(mode: HashMode) None [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:HASHtoelem driver.configure.connection.security.set_hashto_elem(mode = enums.HashMode.BOTH)
Selects authentication and key management mechanism supported by the R&S CMW:
- param mode:
HUNT | H2E | BOTH HUNT: hunting-and-pecking negotiated in SAE exchange H2E:SAE hash-to-element is mandatory for WPA3 and for SAE in 6 GHz band BOTH: the R&S CMW supports both techniques
- set_pmf(protection: Protection) None [source]
# SCPI: CONFigure:WLAN:SIGNaling<instance>:CONNection:SECurity:PMF driver.configure.connection.security.set_pmf(protection = enums.Protection.REQuired)
Selects, whether the protection management frames are unsupported, supported or required. This parameter applies to WPA2, WPA3 in AP operation mode.
- param protection:
UNSupported | SUPPorted | REQuired
Cloning the Group
# Create a clone of the original group, that exists independently
group2 = driver.configure.connection.security.clone()
Subgroups