
Copyright © 2004-2005, Vivato, Inc.
96
See Also
For information on how to configure WPA with RADIUS security mode, see “WPA with RADIUS” on
page 104 under “Configuring Security Settings” on page 97.
When to Use WPA-PSK
Wi-Fi Protected Access
(
) with
Pre-Shared Key
(
) is a Wi-Fi Alliance subset of IEEE
which includes
Temporal Key Integrity Protocol
(
)
Advanced Encryption Algorithm
(
AES
), and
Counter mode/CBC-MAC Protocol
(CCMP) mechanisms. This mode offers the same encryption
algorithms as WPA with RADIUS but without the ability to integrate a RADIUS server for user
authentication.
Recommendations
WPA w/PSK is not recommended for use with the Vivato VA4200 when WPA with RADIUS is an option.
We recommend that you use WPA with RADIUS mode instead, unless you have interoperability issues
that prevent you from using this mode.
For example, some devices on your network may not support WPA with
server.
Embedded printer servers or other small client devices with very limited space for implementation may not
support RADIUS. For such cases, we recommend that you use WPA-PSK.
See Also
For information on how to configure WPA-PSK security mode, see “WPA-PSK” on page 108 under
“Configuring Security Settings” on page 97.
Note
If there are older client stations on your network that do not support WPA, you can configure WPA
with RADIUS (with Both, CCMP, or TKIP) and check the "Allow non-WPA IEEE 802.1x clients" check-
box
to allow non-WPA clients. This way, you get the benefit of IEEE 802.1x key management
for non-WPA clients along with even better data protection of TKIP and CCMP (AES) key
management and encryption algorithms for your WPA clients.
A typical scenario is when upgrading a current 802.1x network to use WPA. You might have a mix of
clients; some new clients that support WPA and some older ones that do not support WPA. You might
even have other AP/Bridges on the network that support only 802.1x and some that support WPA with
RADIUS. For as long as this mix persists, use the "Allow non-WPA IEEE 802.1x clients" option
When all the stations have been upgraded to use WPA, you should disable the "Allow non-WPA IEEE
802.1x clients" option.
Key Management
Encryption Algorithms
User Authentication
WPA-PSK provides dynamically-
generated keys that are periodically
refreshed.
There are different
keys for
each station.
•
Temporal Key Integrity Protocol
)
•
Counter mode/CBC-MAC Proto-
col
(
Advanced Encryption
Standard
(
The use of a Pre-Shared (
) key
provides user authentication similar
to that of shared keys in