26
connecting each other. Setup the same key as the wireless device that the adapter
intends to connect.
LEAP:
LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the features of EAP
protocols. Cisco controls the ability of other vendors to implement this protocol, so it
should be selected for server products are not a concern. When you have set up LEAP
authentication, you have to enter the use name and password of your computer.
WPA:
WPA provides a scheme of mutual authentication using either IEEE
802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK)
technology. It provides a high level of assurance to enterprise, small business and home
users that data will remain protected and that only authorized users may access their
networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA
offers the advantage of leveraging existing authentication databases and infrastructure.
WPA-PSK
– It is a special mode designed for home and small business users who do
not have access to network authentication servers. In this mode, known as Pre-Shared
Key, the user manually enters the starting password in their access point or gateway, as
well as in each wireless station in the network. WPA-PSK takes over automatically from
that point, keeping unauthorized users that don’t have the matching password from
joining the network, while encrypting the data traveling between authorized devices.
WPA2
– Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology.
It also includes a new advanced encryption mechanism using the Advanced Encryption
Standard (AES). AES is required to the corporate user or government users. The
different between WPA and WPA2 is that WPA2 provides data encryption via the AES. In
contrast, WPA uses Temporal Key Integrity Protocol (TKIP).
WPA2-PSK
– WPA2-PSK is also for home and small business. The difference between
WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption via the AES. In
contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP).
WPA 802.1X
– 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x
authentication was optional.
WPA2 802.1X
–
WPA2 is the next-generation Wi-Fi security standard, combining the
most powerful authentication and encryption techniques to protect wireless networks
from unauthorized use. Based upon the recently ratified IEEE 802.11i standard, WPA2
adds the Advanced Encryption Standard (AES) to the original WPA specification to
provide the greatest levels of network security available. The National Institute of
Standards and Technology (NIST) advocate the use of AES security to protect sensitive
digital information on government networks.
802.1x Setting:
When you have set the Authentication Type to Open, Shared, WPA or WPA2,
you can also enable IEEE 802.1x setting to use the authentication server or certification server
to authenticate client users.