Intellinet Network Solutions 525336 Servers. In this mode, known as Pre-Shared Key, the user

Page 16

 

business users who do not have access to network authentication

 

servers. In this mode, known as Pre-Shared Key, the user

 

manually enters the starting password in their access point or

 

gateway, as well as in each wireless station in the network.

 

WPA-PSK takes over automatically from that point, keeping

 

unauthorized users that don’t have the matching password from

 

joining the network, while encrypting the data traveling between

 

authorized devices.

 

WPA2-PSKWPA2-PSK is also for home and small business.

 

The difference between WPA-PSK and WPA2-PSK is that

 

WPA2-PSK provides data encryption via AES. In contrast,

 

WPA-PSK uses the Temporal Key Integrity Protocol (TKIP).

 

WPA 802.1X – WPA provides a scheme of mutual authentication

 

using either IEEE 802.1x / Extensible Authentication Protocol

 

(EAP) authentication or pre-shared key (PSK) technology. It

 

provides a high level of assurance to enterprises, small

 

businesses and home users that data will remain protected and

 

that only authorized users may access their networks. For

 

enterprises that have already deployed IEEE 802.1x

 

authentication, WPA offers the advantage of leveraging existing

 

authentication databases and infrastructures.

 

WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x / EAP

 

authentication or PSK technology. It also includes a new

 

advanced encryption mechanism using the Advanced Encryption

 

Standard (AES). AES is required for corporate or government

 

users. The difference between WPA and WPA2 is that

 

WPA2 provides data encryption via AES. In contrast, WPA uses

 

the Temporal Key Integrity Protocol (TKIP).

 

WEP 802.1X – This is a special mode for using IEEE 802.1x /

 

EAP technology for authentication and WEP keys for data

 

encryption.

Data Encryption

Disabled – Disable the WEP Data Encryption.

 

WEP – Enable the WEP Data Encryption. When this is selected,

 

you need to continue setting the WEP Encryption keys.

 

TKIP – TKIP (Temporal Key Integrity Protocol) changes the

 

temporal key every 10,000 packets (a packet is a kind of message

 

transmitted over a network). This ensures much greater security

 

than the standard WEP security.

 

AES – AES has been developed to ensure the highest degree of

 

security and authenticity for digital information, and it is the most

 

advanced solution defined by IEEE 802.11i for security in the

 

wireless network.

 

N O TE : All devices in the network should use the same

 

encryption method to ensure proper communication.

 

14

Image 16
Contents Nano 150N Wireless USB Adapter Contents Features SpecificationsSystem Requirements Installation Procedure Install the Driver and UtilityPage II. Connect to a Wireless Access Point Use Windows Zero Configuration on Windows Vista Page Page Configuration Utility Utility OverviewAvailable Network General Profile SsidConfigure the Profile Servers. In this mode, known as Pre-Shared Key, the user Ascii Status StatisticsWi-Fi Protect Setup WPS Pin Input Config PINPage II. Push Button Config PBC Software AP BssidAP Properties Setting AP Statistics Page Reference Terminology Federal Communications Commission Interference Statement TTE Compliance Statement