Contents xi
August 2004
Overview of WEP Parameters ................................................................................ D-5
Key Size ....................................................................... ........................................... D-6
WEP Configuration Options ............................................ .... ... ... ... .... ... ... ... ... .... .......D-7
Wireless Channels ......................................................................................................... D-7
WPA Wireless Security .................................................................................................. D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i? ........................................................D-10
What are the Key Features of WPA Security? ......................................................D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. D-12
WPA Data Encryption Key Management ........................................................ D-14
Is WPA Perfect? .................................................................................................... D-16
Product Support for WPA ...................................................................................... D-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged ......D-16
Changes to Wireless Access Points ............................................................... D-16
Changes to Wireless Network Adapters ......................................................... D-17
Changes to Wireless Client Programs ............................................................ D-18
Glossary