Ovation Software Ovation user manual WiFi Protected Access WPA, What are the drawbacks?

Models: Ovation

1 61
Download 61 pages 18.41 Kb
Page 39
Image 39

Wireless Security Settings

WiFi Protected Access (WPA

This type of encryption helps protect your network from unauthorized access and eavesdroppers. Like WEP, an encryption key scrambles the data between your computers and your Ovation. Like WEP Shared, computers must authenticate with your Ovation to join the network. This is where the similarities end.

With WEP the encryption key is static – it stays the same until you change it. With WPA

again on each computer you want to connect to your network. Then the WPA Temporal Key Integrity Protocol (TKIP) takes over.

TKIP mathematically derives encryption keys based on your initial passphrase. Keys are automatically changed, rotated and authenticated among devices in your network. The same key is never used twice. WPA

referred to as extraength encryption.

What are the drawbacks?

To use WPA

must support WPA. Older devices – those manufactured before August 2003 – might not support this new standard. Check with your manufacturer to see if a software upgrade is available.

Setting up WPA

Your WPA

contain special characters and spaces. Ideally, a passphrase should consist of 20 characters, be a mixture of uppercase and lowercase letters, and contain numbers and punctuation marks.

Since your passphrase provides the starting point for the rekeying process, using a passphrase that is difficult to crack strengthens your network security.

38

Page 39
Image 39
Ovation Software Ovation user manual WiFi Protected Access WPA, What are the drawbacks?