Professional Access Point Administrator Guide
Key Management
IEEE 802.1x provides dynamically- generated keys that are periodically refreshed.
There are different Unicast keys for each station.
Encryption Algorithm
An RC4 stream cipher is used to encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11 frame.
User Authentication
IEEE 802.1x mode supports a vari- ety of authentication methods, like certificates, Kerberos, and public key authentication with a RADIUS server.
You have a choice of using the Pro- fessional Access Point embedded RADIUS server or an external RADIUS server. The embedded RADIUS server supports Protected EAP (PEAP) and MSCHAP V2.
RECOMMENDATIONS
IEEE 802.1x mode is a better choice than Static WEP because keys are dynamically generated and changed periodically. However, the encryption algorithm used is the same as that of Static WEP and is therefore not as reliable as the more advanced encryption methods such as TKIP and CCMP (AES) used in
Additionally, compatibility issues may be cumbersome because of the variety of authentication methods supported and the lack of a standard implementation method.
Therefore, IEEE 802.1x mode is not as secure a solution as
SEE ALSO
For information on how to configure IEEE 802.1x security mode, see “IEEE 802.1x” on page 114 under “Configuring Security Settings”.
When to Use WPA/WPA2 Personal (PSK)
This security mode is backward compatible for wireless clients that support only the original WPA.
Key Management
WPA/WPA2 Personal (PSK) pro- vides
There are different Unicast keys for each station.
Encryption Algorithms
•Temporal Key Integrity Protocol (TKIP)
•Counter
User Authentication
The use of a
Security - 104