ZyXEL Communications wireless active fiber router WPA2, Encryption, EAP-MD5, Eap-Tls, Eap-Ttls

Models: wireless active fiber router

1 183
Download 183 pages 30.96 Kb
Page 150
Image 150
EAP-MD5

Appendix D Wireless LANs

If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.

Note: EAP-MD5 cannot be used with dynamic WEP key exchange.

For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types.

Comparison of EAP Authentication Types

 

EAP-MD5

EAP-TLS

EAP-TTLS

PEAP

LEAP

Mutual

No

Yes

Yes

Yes

Yes

Authentication

 

 

 

 

 

Certificate – Client

No

Yes

Optional

Optional

No

Certificate – Server

No

Yes

Yes

Yes

No

Dynamic Key

No

Yes

Yes

Yes

Yes

Exchange

 

 

 

 

 

Credential Integrity

None

Strong

Strong

Strong

Moderate

Deployment

Easy

Hard

Moderate

Moderate

Moderate

Difficulty

 

 

 

 

 

Client Identity

No

No

Yes

Yes

No

Protection

 

 

 

 

 

WPA(2)

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA.

Key differences between WPA(2) and WEP are improved data encryption and user authentication.

Encryption

Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1X. In addition to TKIP, WPA2 also uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption.

Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism.

150

FSG1100HN User’s Guide

Page 150
Image 150
ZyXEL Communications wireless active fiber router manual WPA2, Encryption, EAP-MD5, Eap-Tls, Eap-Ttls, Peap, Leap