Appendix D Wireless LANs
Figure 109
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type. MAC address filters are not dependent on how you configure these security features.
Table 64 Wireless Security Relational Matrix
AUTHENTICATION | ENCRYPTIO | ENTER |
| |
METHOD/ KEY | IEEE 802.1X | |||
N METHOD | MANUAL KEY | |||
MANAGEMENT PROTOCOL |
| |||
Open | None | No | Disable | |
|
|
|
| |
|
|
| Enable without Dynamic WEP Key | |
|
|
|
| |
Open | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
| |
Shared | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
| |
WPA | TKIP/AES | No | Enable | |
|
|
|
| |
TKIP/AES | Yes | Disable | ||
|
|
|
| |
WPA2 | TKIP/AES | No | Enable | |
|
|
|
| |
TKIP/AES | Yes | Disable | ||
|
|
|
|
Antenna Overview
An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air.
Positioning the antennas properly increases the range and coverage area of a wireless LAN.
178 |
|
WAP3205 v2 User’s Guide | |
|
|