Professional Access Point Administrator Guide
Field
Description
WPA Versions | Select the types of clients you want to support: | |
| • | |
|
| WPA2, then select WPA |
| • | |
|
| which provides the best security per the IEEE 802.11i standard. |
| • | |
|
| port only the original WPA, select Both. This option lets both WPA and WPA2 clients |
|
| associate and authenticate, but uses the more robust WPA2 for clients who support it. |
|
| This WPA configuration allows more interoperability, at the expense of some security. |
|
| |
Cipher Suites | Select the cipher you want to use from the list: | |
| • |
|
|
| TKIP provides a more secure encryption solution than WEP keys. The TKIP |
|
| process more frequently changes the encryption key used and better ensures |
|
| that the same key will not be reused to encrypt data (a weakness of WEP). TKIP |
|
| uses a |
|
| key is combined with the client's MAC address and a |
|
| to produce the key that will encrypt the data. This ensures that each client uses a |
|
| different key to encrypt data. TKIP uses RC4 to perform the encryption, which is |
|
| the same as WEP. But TKIP changes temporal keys every 10,000 packets and |
|
| distributes them, thereby greatly improving the security of the network. |
| • | CCMP |
|
| IEEE 802.11i that uses the Advanced Encryption Algorithm (AES). It uses a CCM |
|
| combined with Cipher Block Chaining Counter mode |
|
| ing Message Authentication Code |
| • | |
|
| ents can associate with the access point. WPA clients must have one of the fol- |
|
| lowing to be able to associate with the access point: |
|
| • A valid TKIP key |
|
| • A valid CCMP (AES) key |
| Clients not configured to use a | |
| access point. | |
|
|
|
Security - 116