What are the Key Features of WPA Security? | |
WPA Authentication: |
|
Authentication via 802.1x/EAP and RADIUS | |
WPA Data Encryption Key Management | |
Is WPA Perfect? | |
Product Support for WPA | |
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged | |
Changes to Wireless Access Points | |
Changes to Wireless Network Adapters | |
Changes to Wireless Client Programs | |
Appendix C |
|
Command Line Reference |
|
Command Sets | |
Glossary |
|
x | Contents |