Appendix D Wireless LANs

Figure 109 WPA(2)-PSK Authentication

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type. MAC address filters are not dependent on how you configure these security features.

Table 64 Wireless Security Relational Matrix

AUTHENTICATIONENCRYPTIOENTER

 

METHOD/ KEYIEEE 802.1X
N METHODMANUAL KEY
MANAGEMENT PROTOCOL

 

Open

None

No

Disable

 

 

 

 

 

 

 

Enable without Dynamic WEP Key

 

 

 

 

Open

WEP

No

Enable with Dynamic WEP Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

Shared

WEP

No

Enable with Dynamic WEP Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

WPA

TKIP/AES

No

Enable

 

 

 

 

WPA-PSK

TKIP/AES

Yes

Disable

 

 

 

 

WPA2

TKIP/AES

No

Enable

 

 

 

 

WPA2-PSK

TKIP/AES

Yes

Disable

 

 

 

 

Antenna Overview

An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air.

Positioning the antennas properly increases the range and coverage area of a wireless LAN.

178

 

WAP3205 v2 User’s Guide