Interface Commands

Command Usage

Wi-Fi Protected Access (WPA) provides improved data encryption, which was weak in WEP, and user authentication, which was largely missing in WEP. WPA uses the following security mechanisms.

Enhanced Data Encryption through TKIP

WPA uses Temporal Key Integrity Protocol (TKIP). TKIP provides data encryption enhancements including per-packet key hashing (i.e., changing the encryption key on each packet), a message integrity check, an extended initialization vector with sequencing rules, and a re-keying mechanism.

Enterprise-level User Authentication via 802.1x and EAP

To strengthen user authentication, WPA uses 802.1x and the Extensible Authentication Protocol (EAP). Used together, these protocols provide strong user authentication via a central RADIUS authentication server that authenticates each user on the network before they join it. WPA also employs “mutual authentication” to prevent a wireless client from accidentally joining a rogue network.

Example

SMC-AP(if-wireless g)#wpa-client required

SMC-AP(if-wireless g)#

Related Commands

wpa-mode (page 6-92)

6-91

Page 219
Image 219
SMC Networks SMC2555W-AG manual Enhanced Data Encryption through Tkip