202-10072-01, March 2005
xContents
Key Size ....................................................................... ........................................... D-6
WEP Configuration Options ............................................ .... ... ... ... .... ... ... ... ... .... .......D-7
Wireless Channels ......................................................................................................... D-7
WPA and WPA2 Wireless Security ................................................................................ D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................D-10
What are the Key Features of WPA and WPA2 Security? .................................... D-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. D-12
WPA/WPA2 Data Encryption Key Management .............................................D-14
Is WPA/WPA2 Perfect? ......................................................................................... D-16
Product Support for WPA/WPA2 ........................................................................... D-16
Supporting a Mixture of WPA, WPA2, and WEP
Wireless Clients is Discouraged ...................................................... ... ... .... ... .. D-16
Changes to Wireless Access Points ............................................................... D-17
Changes to Wireless Network Adapters ......................................................... D-17
Changes to Wireless Client Programs ............................................................ D-18
Glossary