Chapter 2: Basic Checkout
Setting Up The Model RA2040 802.11g Radio
Note: | WEP cannot be disabled if you are using WPA or |
TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11 standard for wireless LANs. Designed to enhance WEP, TKIP uses the original WEP programming but ‘wraps’ additional code at the beginning and end to encapsulate and modify it, encrypting each data packet with a unique encryption key.
Authentication
802.11supports a number of subtypes of network authentication services: Open, Shared, WPA and
Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentica- tion management frame that contains the identity of the sending station. The receiv- ing station then sends back a frame that indicates whether it recognizes the identity of the sending station.
Using Shared authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel.
WPA
The first method of user authentication is intended for environments using a central- ized Authentication Server, such as RADIUS. User authentication is based on IEEE 802.1X and mutual authentication based EAP.
In environments where a centralized Authentication Server or EAP framework is not available, user authentication is based on a
Network Key
This text box is used to specify a 5 or 13 ASCII character sequence or an equivalent 10 or 26 Hexadecimal digit sequence that matches the active WEP key on the access point.
Psion Teklogix 8515 | 13 |