WPA Wireless Security

D-8

How Does WPA Compare to WEP?

D-9

How Does WPA Compare to IEEE 802.11i?

D-10

What are the Key Features of WPA Security?

D-10

WPA Authentication: Enterprise-level User

 

Authentication via 802.1x/EAP and RADIUS

D-12

WPA Data Encryption Key Management

D-14

Is WPA Perfect?

D-16

Product Support for WPA

D-16

Supporting a Mixture of WPA and WEP Wireless Clients

D-16

Changes to Wireless Access Points

D-16

Changes to Wireless Network Adapters

D-17

Changes to Wireless Client Programs

D-18

Glossary

Index

x

Contents

202-10039-01

Page 10
Image 10
NETGEAR MR814 v3 manual Glossary Index