Interface Commands
6-91
Command Usage
Wi-Fi Protected Access (WPA) provides improved data
encryption, which was weak in WEP, and user authentication,
which was largely missing in WEP. WPA uses the following
security mechanisms.
Enhanced Data Encryption through TKIP
WPA uses Temporal Key Integrity Protocol (TKIP). TKIP
provides data encryption enhancements including per-packet
key hashing (i.e., changing the encryption key on each
packet), a message integrity check, an extended initialization
vector with sequencing rules, and a re-keying mechanism.
Enterprise-level User Authentication via 802.1x and EAP
To strengthen user authentication, WPA uses 802.1x and the
Extensible Authentication Protocol (EAP). Used together,
these protocols provide strong user authentication via a central
RADIUS authentication server that authenticates each user on
the network before they join it. WPA also employs “mutual
authentication” to prevent a wireless client from accidentally
joining a rogue network.
Example
Related Commands
wpa-mode (page 6-92)
SMC-AP(if-wireless g)#wpa-client required
SMC-AP(if-wireless g)#