
Appendix E Wireless LANs
User
’
s Guide
259
If this feature is enabled, it is not necessary to configure a default encryption key
in the Wireless screen. You may still configure and store keys here, but they will
not be used while Dynamic WEP is enabled.
Note: EAP-MD5 cannot be used with dynamic WEP key exchange
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and
PEAP) use dynamic keys for data encryption. They are often deployed in corporate
environments, but for public deployment, a simple user name and password pair
is more practical. The following table is a comparison of the features of
authentication types.
WPA(2)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2
(IEEE 802.11i) is a wireless security standard that defines stronger encryption,
authentication and key management than WPA.
Key differences between WPA(2) and WEP are improved data encryption and user
authentication.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity
Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to
TKIP, WPA2 also uses Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP) to offer
stronger encryption.
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically
generated and distributed by the authentication server. It includes a per-packet
key mixing function, a Message Integrity Check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
Table 82
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate
–
Client
No
Yes
Optional
Optional
No
Certificate
–
Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity
Protection
No
No
Yes
Yes
No
C
om
pan
y
C
on
fiden
tial
Summary of Contents for NBG-417N
Page 9: ...Contents Overview User s Guide 10 C o m p a n y C o n f i d e n t i a l...
Page 17: ...Table of Contents User s Guide 18 C o m p a n y C o n f i d e n t i a l...
Page 19: ...20 C o m p a n y C o n f i d e n t i a l...
Page 23: ...Chapter 1 Introduction User s Guide 24 C o m p a n y C o n f i d e n t i a l...
Page 25: ...Chapter 2 The WPS Button User s Guide 26 C o m p a n y C o n f i d e n t i a l...
Page 37: ...Chapter 3 The Web Configurator User s Guide 38 C o m p a n y C o n f i d e n t i a l...
Page 53: ...Chapter 4 Connection Wizard User s Guide 54 C o m p a n y C o n f i d e n t i a l...
Page 61: ...Chapter 5 AP Mode User s Guide 62 C o m p a n y C o n f i d e n t i a l...
Page 77: ...Chapter 6 Tutorials User s Guide 78 C o m p a n y C o n f i d e n t i a l...
Page 79: ...80 C o m p a n y C o n f i d e n t i a l...
Page 117: ...Chapter 9 LAN User s Guide 118 C o m p a n y C o n f i d e n t i a l...
Page 123: ...Chapter 10 DHCP Server User s Guide 124 C o m p a n y C o n f i d e n t i a l...
Page 137: ...Chapter 12 DDNS User s Guide 138 C o m p a n y C o n f i d e n t i a l...
Page 138: ...139 PART III Security Firewall 141 Content Filtering 147 C o m p a n y C o n f i d e n t i a l...
Page 139: ...140 C o m p a n y C o n f i d e n t i a l...
Page 145: ...Chapter 13 Firewall User s Guide 146 C o m p a n y C o n f i d e n t i a l...
Page 151: ...152 C o m p a n y C o n f i d e n t i a l...
Page 155: ...Chapter 15 Static Route User s Guide 156 C o m p a n y C o n f i d e n t i a l...
Page 167: ...Chapter 17 Remote Management User s Guide 168 C o m p a n y C o n f i d e n t i a l...
Page 177: ...Chapter 18 UPnP User s Guide 178 C o m p a n y C o n f i d e n t i a l...
Page 179: ...180 C o m p a n y C o n f i d e n t i a l...
Page 185: ...Chapter 19 System User s Guide 186 C o m p a n y C o n f i d e n t i a l...
Page 197: ...Chapter 22 Sys OP Mode User s Guide 198 C o m p a n y C o n f i d e n t i a l...
Page 199: ...Chapter 23 Language User s Guide 200 C o m p a n y C o n f i d e n t i a l...
Page 207: ...Chapter 24 Troubleshooting User s Guide 208 C o m p a n y C o n f i d e n t i a l...
Page 209: ...210 C o m p a n y C o n f i d e n t i a l...
Page 213: ...Appendix A Product Specifications User s Guide 214 C o m p a n y C o n f i d e n t i a l...
Page 279: ...Index User s Guide 280 C o m p a n y C o n f i d e n t i a l...