
Command Line Interface
6-88
Command Usage
Wi-Fi Protected Access (WPA) provides improved data
encryption, which was weak in WEP, and user authentication,
which was largely missing in WEP. WPA uses the following
security mechanisms.
Enhanced Data Encryption through TKIP
WPA uses Temporal Key Integrity Protocol (TKIP). TKIP
provides data encryption enhancements including per-packet
key hashing (i.e., changing the encryption key on each
packet), a message integrity check, an extended initialization
vector with sequencing rules, and a re-keying mechanism.
Enterprise-level User Authentication via 802.1x and EAP
To strengthen user authentication, WPA uses 802.1x and the
Extensible Authentication Protocol (EAP). Used together,
these protocols provide strong user authentication via a central
RADIUS authentication server that authenticates each user on
the network before they join it. WPA also employs “mutual
authentication” to prevent a wireless client from accidentally
joining a rogue network.
Example
Related Commands
SMC-AP(if-wireless g)#wpa-client required
SMC-AP(if-wireless g)#
Summary of Contents for SMC2555W-AG
Page 1: ...SMC2555W AG ...
Page 2: ......
Page 16: ...TABLE OF CONTENTS xii ...
Page 28: ...Hardware Installation 2 4 ...
Page 194: ...Cables and Pinouts B 6 ...
Page 200: ...Specifications C 6 ...
Page 208: ...Glossary Glossary 8 ...
Page 213: ......