![HP ProCurve 530 NA Management And Configuration Manual Download Page 202](http://html.mh-extra.com/html/hp/procurve-530-na/procurve-530-na_management-and-configuration-manual_166483202.webp)
7-8
Wireless Security Configuration
Wireless Security Overview
connections. The AP 530 supports port-access authentication through the AP
Authentication feature. See
“Configuring 802.1X AP Authentication” on page 7-53
for
more information.
Encryption
The AP 530 supports three types of encryption:
■
Wired Equivalent Privacy (WEP): Key lengths of 64 bits and 128 bits are
possible. WEP provides the least secure method of encryption (static WEP
is not secure, because it can be easily compromised).
■
Temporal Key Integrity Protocol (TKIP): Intermediate security between
WEP and AES with a key length of 256 bits. Provides a more secure
method of encryption than WEP (security is much better than WEP, but
not as robust as CCMP).
■
Counter mode/CBC-MAC Protocol (CCMP): Robust security with a key
length of 128 bits. Provides the most secure method of encryption.
Wired Equivalent Privacy (WEP)
WEP provides a basic level of security, preventing unauthorized access to the
network and encrypting data transmitted between wireless stations and the
access point.
WEP is the security protocol initially specified in the IEEE 802.11 standard
for wireless communications. Unfortunately, static WEP has been found to be
seriously flawed and cannot be recommended for a high level of network
security. For improved wireless security, the access point provides more
robust data encryption methods like TKIP and AES.
Temporal Key Integrity Protocol (TKIP)
TKIP avoids the problems of WEP static keys by dynamically changing data
encryption keys. TKIP starts with a master (temporal) key for each user
session and then mathematically generates other keys to encrypt each data
packet.
TKIP provides further data encryption enhancements by including a message
integrity check for each packet and a re-keying mechanism, that periodically
changes the master key.
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......