![background image](http://html1.mh-extra.com/html/smc-networks/2555w-ag/2555w-ag_user-manual_1301116109.webp)
Radio Interface
5-51
The security mechanisms that may be employed depend on the
level of security required, the network and management
resources available, and the software support provided on
wireless clients. A summary of wireless security considerations is
listed in the following table.
Note:
Although a WEP static key is not needed for WEP over 802.1x,
WPA over 802.1x, and WPA PSK modes, you must enable WEP
encryption through the web or CLI in order to enable all types of
encryption in the access point.
Security
Mechanism
Client
Support
Implementation Considerations
WEP
Built-in support on all
802.11a, 802.11b and
802.11g devices
• Provides only weak security
• Requires manual key management
WEP over
802.1x
Requires 802.1x client
support in system or by
add-in software
(native support provided
in Windows XP)
• Provides dynamic key rotation for
improved WEP security
• Requires configured RADIUS server
• 802.1x EAP type may require
management of digital certificates for
clients and server
MAC Address
Filtering
Uses the MAC address
of client network card
• Provides only weak user
authentication
• Management of authorized MAC
addresses
• Can be combined with other methods
for improved security
• Optionally configured RADIUS server
WPA over
802.1x mode
Requires WPA-enabled
system and network
card driver
(native support provided
in Windows XP)
• Provides robust security in WPA-only
mode (i.e., WPA clients only)
• Offers support for legacy WEP clients,
but with increased security risk (i.e.,
WEP authentication keys disabled)
• Requires configured RADIUS server
• 802.1x EAP type may require
management of digital certificates for
clients and server
WPA PSK
mode
Requires WPA-enabled
system and network
card driver
(native support provided
in Windows XP)
• Provides good security in small
networks
• Requires manual management of
pre-shared key
Summary of Contents for 2555W-AG
Page 1: ...SMC2555W AG...
Page 2: ......
Page 18: ...COMPLIANCES xiv...
Page 24: ...TABLE OF CONTENTS xx...
Page 38: ...Introduction 1 14...
Page 48: ...Network Configuration 3 6...
Page 58: ...Initial Configuration 4 10...
Page 128: ...System Configuration 5 70...
Page 230: ...Command Line Interface 6 102...
Page 240: ...Cables and Pinouts B 6...
Page 246: ...Specifications C 6...
Page 254: ...Glossary Glossary 8...
Page 259: ......