58 | |
|
|
and also may be the right convenience
Following is a brief discussion of what factors make one mode more secure than another, a description of each mode offered, and when to use each mode.
Comparison of Security Modes for Key Management,
Authentication and Encryption Algorithms
Three major factors that determine the effectiveness of a security protocol are:
∙How the protocol manages keys
∙Presence or absence of integrated user authentication in the protocol
∙Encryption algorithm or formula the protocol uses to encode/decode the data
Following is a list of the security modes available on the
∙When to Use Unencrypted (No Security)
∙When to Use Static WEP
∙When to Use IEEE 802.1x
∙When to Use WPA Personal
∙When to Use WPA Enterprise
When to Use Unencrypted (No Security)
Setting the security mode to None
Recommendations
Unencrypted mode, i.e. None
Therefore, only set the security mode to None
See Also
For information on how to configure unencrypted security mode, see “None
When to Use Static WEP
Static WEP (Wired Equivalent Privacy) is a data encryption protocol for 802.11 wireless networks. All wireless stations and access points on the network are configured with a static