|
|
|
| ||
| Table 95 Wireless Security Relational Matrix (continued) |
|
| ||
|
|
|
|
|
|
| AUTHENTICATION | ENCRYPTION | ENTER |
|
|
| METHOD/ KEY | ENABLE IEEE 802.1X |
| ||
| METHOD | MANUAL KEY |
| ||
| MANAGEMENT PROTOCOL |
|
| ||
|
|
|
|
|
|
| Shared | WEP | No | Enable with Dynamic WEP Key |
|
|
|
|
|
|
|
|
|
| Yes | Enable without Dynamic WEP Key |
|
|
|
|
|
|
|
|
|
| Yes | Disable |
|
|
|
|
|
|
|
| WPA | WEP | No | Yes |
|
|
|
|
|
|
|
| WPA | TKIP | No | Yes |
|
|
|
|
|
|
|
| WEP | Yes | Yes |
| |
|
|
|
|
|
|
| TKIP | Yes | Yes |
| |
|
|
|
|
|
|
Appendix G Wireless LANs | 265 |