![background image](http://html1.mh-extra.com/html/smc-networks/2555w-ag/2555w-ag_user-manual_1301116219.webp)
Interface Commands
6-91
Command Usage
Wi-Fi Protected Access (WPA) provides improved data
encryption, which was weak in WEP, and user authentication,
which was largely missing in WEP. WPA uses the following
security mechanisms.
Enhanced Data Encryption through TKIP
WPA uses Temporal Key Integrity Protocol (TKIP). TKIP
provides data encryption enhancements including per-packet
key hashing (i.e., changing the encryption key on each
packet), a message integrity check, an extended initialization
vector with sequencing rules, and a re-keying mechanism.
Enterprise-level User Authentication via 802.1x and EAP
To strengthen user authentication, WPA uses 802.1x and the
Extensible Authentication Protocol (EAP). Used together,
these protocols provide strong user authentication via a central
RADIUS authentication server that authenticates each user on
the network before they join it. WPA also employs “mutual
authentication” to prevent a wireless client from accidentally
joining a rogue network.
Example
Related Commands
wpa-mode (page 6-92)
SMC-AP(if-wireless g)#wpa-client required
SMC-AP(if-wireless g)#
Summary of Contents for 2555W-AG
Page 1: ...SMC2555W AG...
Page 2: ......
Page 18: ...COMPLIANCES xiv...
Page 24: ...TABLE OF CONTENTS xx...
Page 38: ...Introduction 1 14...
Page 48: ...Network Configuration 3 6...
Page 58: ...Initial Configuration 4 10...
Page 128: ...System Configuration 5 70...
Page 230: ...Command Line Interface 6 102...
Page 240: ...Cables and Pinouts B 6...
Page 246: ...Specifications C 6...
Page 254: ...Glossary Glossary 8...
Page 259: ......