
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 5: Authentication and Encryption
113
WPA and 802.11i
The Wi-Fi published WPA (Wireless Protected Access) specification
identifies a feature subset of the IEEE 802.11i standard. WPA is one
of the answers to the well-publicized vulnerability of static WEP as
specified by the original IEEE 802.11 specification. Most wireless
vendors support WPA and consider it to be a more secure alternative
to static WEP.
Figure 5-5: 802.1x user-based authentication and encryption framework
There are three major end-user benefits provided by the
WPA
products:
•
802.1x
allows user-based authentication instead of the vul-
nerable global encryption key method.
•
TKIP
(Temporal Key Integrity Protocol) enhances industrial
strength encryption with dynamic keying.
•
PMK
(Pre-shared Master Key) allows small- and medium-
sized deployments to use 802.1x and TKIP without complex
infrastructure back-end servers (such as RADIUS).
Laptop Wireless LAN Policy Reference Guide.book Page 113 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...