Wireless Security Protocols
Security
Protocol
Description
WPA: RADIUS
authentication,
encryption
The WPA (Wi-Fi Protected Access) security method uses MIC (message
integrity check) to ensure the integrity of messages, and TKIP (Temporal Key
Integrity Protocol) to enhance data encryption.
Furthermore, WPA includes 802.1x and EAP authentication, based on a
central RADIUS authentication server. This method is recommended for
situations where you want to authenticate wireless stations using a RADIUS
server, and to encrypt the transmitted data.
Note:
To use this security method, you must first configure a RADIUS server
which supports 802.1x. See
Using RADIUS Authentication.
on page 368
WPA-PSK:
password
authentication,
encryption
The WPA-PSK security method is a variation of WPA that does not require an
authentication server. WPA-PSK periodically changes and authenticates
encryption keys. This is called
rekeying
.
This option is recommended for small networks, which want to authenticate
and encrypt wireless data, but do not want to install a RADIUS server.
Note:
The appliance and the wireless stations must be configured with the
same passphrase.
WPA2 (802.11i)
The WPA2 security method uses the more secure Advanced Encryption
Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP.
When using WPA or WPA-PSK security methods, the NetDefend enables you
to restrict access to the WLAN network to wireless stations that support the
WPA2 security method. If this setting is not selected, the NetDefend firewall
allows clients to connect using both WPA and WPA2.
164
D-Link NetDefend firewall User Guide