Appendix D Wireless LANs
If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.
Note:
For added security,
Table 81 Comparison of EAP Authentication Types
|
|
|
| PEAP | LEAP |
Mutual Authentication | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Certificate – Client | No | Yes | Optional | Optional | No |
|
|
|
|
|
|
Certificate – Server | No | Yes | Yes | Yes | No |
|
|
|
|
|
|
Dynamic Key Exchange | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Credential Integrity | None | Strong | Strong | Strong | Moderate |
|
|
|
|
|
|
Deployment Difficulty | Easy | Hard | Moderate | Moderate | Moderate |
|
|
|
|
|
|
Client Identity | No | No | Yes | Yes | No |
Protection |
|
|
|
|
|
|
|
|
|
|
|
WPA(2)
Key differences between WPA(2) and WEP are improved data encryption and user authentication.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to TKIP, WPA2 also uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption.
Temporal Key Integrity Protocol (TKIP) uses