91
Copyright © 2004-2005, Vivato, Inc.
Configuring Security
Each SSID network that you configure on the AP/Bridge has its own Security Mode associated with it that
clients must be configured to use in order to access that network. For information on creating and editing
SSIDs, see “Creating and Editing SSIDs” on page 87.
The following sections describe how to configure Security settings:
•
Understanding Security Issues on Wireless Networks
›
How Do I Know Which Security Mode to Use?
›
Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms
›
Does Prohibiting the Broadcast SSID Enhance Security?
•
Navigating to Security Settings
•
›
›
›
›
›
•
Understanding Security Issues on Wireless Networks
Wireless mediums are inherently less secure than wired mediums. For example, an Ethernet NIC trans-
mits its packets over a physical medium such as coaxial cable or twisted pair. A wireless NIC broadcasts
radio signals over the air, allowing a wireless LAN’s signal to be received without physical access or
sophisticated equipment. A hacker equipped with a laptop, a wireless NIC, and a bit of knowledge can
attempt to compromise your wireless network. Using a higher gain antenna on the client, a hacker may be
able to connect to the network from many miles away.
The Vivato Wi-Fi AP/Bridge provides a number of authentication and encryption schemes to ensure that
your wireless infrastructure is accessed only by the intended users. The details of each security mode are
described in the sections below.
For a more detailed explanation of security concepts, including a comparison of the advantages and
disadvantages of using different security modes and suggestions on which mode to use; see
Understanding Security Issues on Wireless Networks
in the Users Guide.
See also the related topic, Appendix A:“Configuring Security Settings on Wireless Clients” in the User
Guide.