Appendix B - Wireless Technology

FIG. 75 WPA Overview

The 802.11i architecture contains the following components: 802.1X for authentication (entailing the use of EAP and an authentication server), RSN for keeping track of associations, and AES-based CCMP to provide confidentiality, integrity and origin authentication.

WPA2 implements the full standard, but will not work with some older network cards. Both provide good security, with two significant issues:

-either WPA or WPA2 must be enabled and chosen in preference to WEP. WEP is usually presented as the first security choice in most installation instructions.

-in the "Personal" mode, the most likely choice for homes and small offices, a passphrase is required that, for full security, must be longer than the typical 6 to 8 character passwords users are taught to employ.

With the RC4 released to the general public the IEEE implemented the Advanced Encryption Standard (AES) as the cipher engine for 802.11i, which the Wi-Fi Alliance has branded as WPA2.

FIG. 76 WPA2 Overview

MVP-8400i 8.4" Modero® ViewPoint® Touch Panel with Intercom

165

 

 

Page 179
Image 179
AMX manual MVP-8400i 8.4 Modero ViewPoint Touch Panel with Intercom 165