NETGEAR WMS105-10000S user manual Rogue Access Points, Network Authentication and Data Encryption

Page 20

ProSafe 5 AP Wireless Management Software WMS105

The following table shows the data encryption options based on network authentication.

Table 2. Network Authentication and Data Encryption

 

Network Authentication

Data Encryption

Description

 

 

 

 

 

Open

None

No encryption.

 

 

WEP

 

 

 

 

 

 

Shared Key

WEP

64-bit WEP encryption uses 40/64

 

 

 

bit encryption.

 

 

 

128-bit WEP encryption uses

 

 

 

104/128 bit encryption.

 

 

 

152-bit WEP is a proprietary mode

 

 

 

that will only work with other

 

 

 

wireless devices that support this

 

 

 

mode.

 

 

 

 

 

Legacy 802.1x

Select the WPA2 option only if all

All require RADIUS configurations.

 

WPA with RADIUS

clients support WPA2. If selected,

 

 

WPA2 with RADIUS

you must use AES.

 

 

 

WPA/WPA2 with RADIUS allows

 

 

 

clients to use either WPA (with

 

 

 

TKIP) or WPA2 (with AES). If

 

 

 

selected, you must use TKIP +

 

 

 

AES encryption.

 

 

 

 

 

 

WPA-PSK

TKIP or TKIP +AES and a WPA

Standard encryption method for WPA2.

 

WPA2-PSK

passphrase (network key)

 

 

 

 

 

 

WPA2-PSK

AES and TKIP + AES

Some clients might support AES with

 

 

 

WPA, but this is not supported by this

 

 

 

access point.

 

 

 

 

 

WPA and WPA2

TKIP + AES encryption and enter the

Clients can use either WPA (with TKIP)

 

 

WPA passphrase (network key).

or WPA2 (with AES).

 

 

 

 

 

WPA-PSK/WPA2-PSK

TKIP + AE

Broadcast packets use TKIP. For

 

 

 

unicast (point-to-point) transmissions,

 

 

 

and WPA clients use TKIP, and WPA2

 

 

 

clients use AES.

 

 

 

 

Rogue Access Points

 

Unidentified access points that use the SSID of a legitimate network can present a serious security threat. Rogue Access Point Detection is enabled by default on managed access points. To detect rogue access points, the Wireless Management Software or access point scans the wireless environment on all available channels, looking for unidentified access points.

20 Chapter 4: Security Configuration

Image 20
Contents ProSafe 5 AP Wireless Management Software WMS105 Technical Support NETGEAR, Inc Table of Contents Index Installing the Software Getting StartedLogging System SettingsGeneral Settings Time Settings Syslog Settings Access Point Discovery Auto DiscoveryIP Discovery To use Auto DiscoveryDiscovery Results To use IP DiscoveryAdding Access Points Wireless Configuration Configuring Centralized RF ManagementProSafe 5 AP Wireless Management Software WMS105 Advanced Wireless Settings To manually specify the Wlan parameters for access pointsSend packet before sending the actual packet data To specify QoS settings Configuring QoSQoS for Managed Access Points To view or change security profiles Security ConfigurationSecurity Profiles List Editing a Security Profile Rogue Access Points Network Authentication and Data EncryptionMAC Authentication To set up MAC Authentication Radius Server Settings To configure Radius Server SettingsConfiguring Guest Access To set up guest accessSummary Access Point SummaryMonitoring Wireless Stations Access Point StatusAccess Point Status Details Profile InformationMonitoring Rogue Access Points Client StatusProSafe 5 AP Wireless Management Software WMS105 To change the password MaintenanceChanging Passwords Reset SnmpUpgrading Access Point Firmware Remote ManagementTo upgrade the access point software Backing up Configuration Settings Restoring Settings from a FileTo back up the Wireless Management Software settings To restore settings from a backup fileDownloading Wireless Management Software Logs To download logsUsing Discovery OUI To change the settingsAccess Point Compatibility Access Point Supported Firmware VersionsSoftware Features and Access Point Compatibility SSHIndex Index