connecting each other. Setup the same key as the wireless device that the adapter intends to connect.

LEAP: LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP protocols. Cisco controls the ability of other vendors to implement this protocol, so it should be selected for server products are not a concern. When you have set up LEAP authentication, you have to enter the use name and password of your computer.

WPA: WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides a high level of assurance to enterprise, small business and home users that data will remain protected and that only authorized users may access their networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA offers the advantage of leveraging existing authentication databases and infrastructure.

WPA-PSK– It is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless station in the network. WPA-PSK takes over automatically from that point, keeping unauthorized users that don’t have the matching password from joining the network, while encrypting the data traveling between authorized devices.

WPA2 – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required to the corporate user or government users. The different between WPA and WPA2 is that WPA2 provides data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP).

WPA2-PSKWPA2-PSK is also for home and small business. The difference between WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption via the AES. In contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP).

WPA 802.1X – 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x authentication was optional.

WPA2 802.1X – WPA2 is the next-generation Wi-Fi security standard, combining the most powerful authentication and encryption techniques to protect wireless networks from unauthorized use. Based upon the recently ratified IEEE 802.11i standard, WPA2 adds the Advanced Encryption Standard (AES) to the original WPA specification to provide the greatest levels of network security available. The National Institute of Standards and Technology (NIST) advocate the use of AES security to protect sensitive digital information on government networks.

802.1x Setting: When you have set the Authentication Type to Open, Shared, WPA or WPA2, you can also enable IEEE 802.1x setting to use the authentication server or certification server to authenticate client users.

26

Page 27
Image 27
Advantek Networks AWN-MIMO-54RA user manual