60 | |
|
|
Additionally, compatibility issues may be cumbersome because of the variety of authentication methods supported and the lack of a standard implementation method.
Therefore, IEEE 802.1x mode is not as secure a solution as
See Also
For information on how to configure IEEE 802.1x security mode, see “IEEE 802.1x” under “Configuring Security Settings”.
When to Use WPA Personal
This security mode is
| Key Management | Encryption Algorithm | User Authentication |
|
|
|
|
| WPA Personal provides | ∙ Temporal Key Integrity | The use of a |
| dynamically- generated keys that | Protocol (TKIP) | key provides user authentication |
| are periodically refreshed. |
| similar to that of shared keys in |
| There are different Unicast keys | ∙ Counter mode / | WEP. |
| Protocol (CCMP) Advanced |
| |
| for each station. | Encryption Standard (AES) |
|
|
|
|
|
Recommendations
WPA Personal is not recommended for use with the
We recommend that you use WPA Enterprise mode instead, unless you have interoperability issues that prevent you from using this mode.
For example, some devices on your network may not support WPA or WPA2 with EAP talking to a RADIUS server. Embedded printer servers or other small client devices with very limited space for implementation may not support RADIUS. For such cases, we recommend that you use WPA Personal.
See Also
For information on how to configure this security mode, see “WPA Personal” under “Configuring Security Settings”.
When to Use WPA Enterprise