Appendix A Wireless LANs
1First enter identical passwords into the AP and all wireless clients. The
2The AP checks each wireless client's password and (only) allows it to join the network if the password matches.
3The AP and wireless clients use the
Figure 187 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
4Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.
Table 92 Wireless Security Relational Matrix
AUTHENTICATION | ENCRYPTIO | ENTER |
|
METHOD/ KEY | IEEE 802.1X | ||
MANAGEMENT | N METHOD | MANUAL KEY | |
PROTOCOL |
|
|
|
Open | None | No | Disable |
|
|
|
|
|
|
| Enable without Dynamic WEP |
|
|
| Key |
|
|
|
|
Open | WEP | No | Enable with Dynamic WEP Key |
|
|
|
|
|
| Yes | Enable without Dynamic WEP |
|
|
| Key |
|
|
|
|
|
| Yes | Disable |
|
|
|
|
Shared | WEP | No | Enable with Dynamic WEP Key |
|
|
|
|
|
| Yes | Enable without Dynamic WEP |
|
|
| Key |
|
|
|
|
|
| Yes | Disable |
|
|
|
|
316 |
| |
| ||
|
|
|