| business users who do not have access to network authentication |
| servers. In this mode, known as |
| manually enters the starting password in their access point or |
| gateway, as well as in each wireless station in the network. |
| |
| unauthorized users that don’t have the matching password from |
| joining the network, while encrypting the data traveling between |
| authorized devices. |
| |
| The difference between |
| |
| |
| WPA 802.1X – WPA provides a scheme of mutual authentication |
| using either IEEE 802.1x / Extensible Authentication Protocol |
| (EAP) authentication or |
| provides a high level of assurance to enterprises, small |
| businesses and home users that data will remain protected and |
| that only authorized users may access their networks. For |
| enterprises that have already deployed IEEE 802.1x |
| authentication, WPA offers the advantage of leveraging existing |
| authentication databases and infrastructures. |
| WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x / EAP |
| authentication or PSK technology. It also includes a new |
| advanced encryption mechanism using the Advanced Encryption |
| Standard (AES). AES is required for corporate or government |
| users. The difference between WPA and WPA2 is that |
| WPA2 provides data encryption via AES. In contrast, WPA uses |
| the Temporal Key Integrity Protocol (TKIP). |
| WEP 802.1X – This is a special mode for using IEEE 802.1x / |
| EAP technology for authentication and WEP keys for data |
| encryption. |
Data Encryption | Disabled – Disable the WEP Data Encryption. |
| WEP – Enable the WEP Data Encryption. When this is selected, |
| you need to continue setting the WEP Encryption keys. |
| TKIP – TKIP (Temporal Key Integrity Protocol) changes the |
| temporal key every 10,000 packets (a packet is a kind of message |
| transmitted over a network). This ensures much greater security |
| than the standard WEP security. |
| AES – AES has been developed to ensure the highest degree of |
| security and authenticity for digital information, and it is the most |
| advanced solution defined by IEEE 802.11i for security in the |
| wireless network. |
| N O TE : All devices in the network should use the same |
| encryption method to ensure proper communication. |
| 14 |