Table 10. Security Definition Parameters
Field
Description
Encryption & Authentication
Choose method
Define the method of encryption and authentication.
A combination of encryption and authentication methods may be
selected from the options detailed in the drop-down list.
Encryption cipher
There are three types of encryption ciphers available:
z
WEP64
– Wired Equivalent Privacy (802.11 encryption
protocol). This is a very basic encryption level. (AKA WEP40)
z
WEP128
– This encryption is similar to WEP64, but the WEP
keys are longer. (AKA WEP104)
z
TKIP
– Temporal Key Integrity Protocol. This is a more secure
and more advanced method of encryption as a part of the WPA
standard.
z
AES (CCMP)
– Advanced Encryption Standard.(Cipher Block
Chaining Message Authentication Code Protocol) is currently
the most advanced and secured method of WiFi encryption and
is part of 802.11i (WPA2) standard.
Authentication method
Authentication is used to identify if a wireless device is authorized
to connect to the WLAN, and verifies the wireless device’s
identity. Authentication methods (such as specific EAP methods
available in the
WPA/WPA2
(RADIUS)
option) also verify that the
association process is secured. Authentication utilizing
WPA/WPA2 (RADIUS) can also support encryption key changes.
The following methods are available:
z
802.1x
– if the cipher is WEP or WEP104
z
WPA/WPA2-PSK
or
WPA/WPA2 (RADIUS)
– if the cipher is
TKIP or AES
z
Supported protocols: EAP, TLS, TTLS, PEAP, LEAP and MD5
When choosing the encryption cipher and authentication
methods, one should take into account wireless devices’
capabilities.
"
Any security combination (Encryption and Authentication) can be
selected by the user as a combination of the list and the check
boxes.
"
The Extricom system supports “WPA2 Mixed Mode”.
This mode permits the coexistence of WPA and WPA2
clients on the same SSID. WPA2 mixed mode allows
“Old” WLAN clients with “New” WLAN clients on
the same SSID during transition period.
36
Configuring the Extricom WLAN System
Summary of Contents for EXRE-10
Page 2: ......
Page 4: ......
Page 20: ......
Page 28: ......
Page 35: ...Figure 16 WLAN Configuration Page The Extricom WLAN System User Guide 27 ...
Page 51: ...Figure 22 Rogue AP configuration The Extricom WLAN System User Guide 43 ...
Page 60: ...Figure 29 Setting Date and Time 52 Configuring the Extricom WLAN System ...
Page 74: ...66 About This Guide ...