B a s i c S e c u r i t y C o n f i g u r a t i o n s

There are two main decisions to be made when choosing wireless security: encryption method and authentication protocol. The encryption method determines the algorithm used to encrypt the message. The authentication type specifies how users are identified and verified on a network. Is the device seeking connection what (and who) it claims to be?

Select an Encryption Method from the following table:

Encryption Method

Type

Algorithm

Size

Description

 

 

(bits)

 

WEP

RC 4

64/128

This is the 64 or 128 bit WEP Key that

 

 

 

must match other nodes’ encryption keys

 

 

 

in order to communicate. The user can

 

 

 

only define 10 hex characters (40 bits) for

 

 

 

64 bit WEP or 26 characters (104 bits) for

 

 

 

128 bit WEP.

WPA

RC 4

64/128

Improves on WEP by using TKIP*

 

 

 

(Temporal Key Integrity Protocol), which

 

 

 

dynamically changes the encryption key

 

 

 

and MIC (Message Integrity Code), which

 

 

 

replaces CRC.

WPA 2

AES

128

Improves on WPA by replacing RC 4 with

 

 

 

AES (Advanced Encryption Standard) for

 

 

 

encryption. The user can only define 26

 

 

 

characters (104 bits) for 128 bit WPA 2.

*Dynamic WEP cannot be selected directly, so select 128 for the encryption mode and select an authentication mode from one of the following: LEAP, PEAP, EAP-FAST, TLS, or TTLS.

Using a Web Browser 3-25

Page 59
Image 59
Paxar 9860 manual S i c S e c u r i t y C o n f i g u r a t i o n s, Encryption Method Type Algorithm Size Description Bits