3.2.1.1 Authentication
vs.
Security
Parameter Description
Authentication Type
This setting has to be consistent with the wireless networks that
the card intends to connect to. All security keys within a network
must match to allow successful communications.
Open
– No authentication is needed among the wireless network.
Shared
– Only wireless stations using a shared key (WEP Key
identified) are allowed to connecting each other.
LEAP
– LEAP is a pre-EAP, Cisco-proprietary protocol, with many
of the features of EAP protocols. Cisco controls the ability of other
vendors to implement this protocol, so it should be selected for
use only when limited vendor choice for client, access-point, and
server products is not a concern. When you have set up LEAP
authentication, you have to enter the user name and password of
your computer.
WPA
– WPA provides a scheme of mutual authentication using
either IEEE 802.1x/Extensible Authentication Protocol (EAP)
authentication or pre-shared key (PSK) technology. It provides a
high level of assurance to enterprises, small businesses and
home users that data will remain protected and that only
authorized users may access their networks. For enterprises that
have already deployed IEEE 802.1x authentication, WPA offers
the advantage of leveraging existing authentication databases
and infrastructure.
WPA-PSK
– It is a special mode designed for home and small
business users who do not have access to network authentication
servers. In this mode, known as Pre-Shared Key, the user
manually enters the starting password in their access point or
gateway, as well as in each wireless station in the network.
WPA-PSK takes over automatically from that point, keeping
unauthorized users that don't have the matching password from
joining the network, while encrypting the data traveling between
authorized devices.
WPA2
– Like WPA, WPA2 supports IEEE 802.1 x/EAP
authentications or PSK technology. It also includes a new
advanced encryption mechanism using the Advanced Encryption
Standard (AES). AES is required to the corporate user or
government users. The difference between WPA and WPA2 is that
WPA2 provides data encryption via the AES. In contrast, WPA
uses Temporal Key Integrity Protocol (TKIP).
WPA2-PSK
– WPA2-PSK is also for home and small business.
15
Содержание HWPG1
Страница 1: ......
Страница 11: ...C Now you have completed the software installation Select Finish 7...
Страница 27: ...Turbo Mode Turbo Mode enables the card to deliver the better throughput in the same period and environment 23...
Страница 28: ...24...
Страница 33: ...B Click Configure C Select Advanced page enable the WMM Capable 29...