Configuring the Wireless Barricade g Router
The security mechanisms that may be employed depend on the level of security required, the network and management resources available, and the software support provided on wireless clients. A summary of wireless security considerations is listed in the following table.
Security | Client | Implementation Considerations | |
Mechanism | Support |
|
|
|
|
|
|
WEP | • | Provides only weak security | |
| 802.11b and 802.11g | • Requires manual key management | |
| devices |
|
|
|
|
| |
WPA mode | Requires | • Provides good security in small | |
| system and network |
| networks |
| card driver | • | Requires configured RADIUS server, |
| (native support provided |
| or manual management of |
| in Windows XP) |
| key |
|
|
| |
| 802.1x mode | • Provides robust security in | |
| Requires |
| mode (i.e., WPA clients only) |
| • Requires configured RADIUS server | ||
| system and network | ||
| card driver | • | 802.1x Extensible Authentication |
| (native support provided |
| Protocol (EAP) type may require |
|
| management of digital certificates for | |
| in Windows XP) |
| |
|
| clients and server | |
|
|
| |
|
|
|
|
54