7-8
Wireless Security Configuration
Wireless Security Overview
connections. The AP 530 supports port-access authentication through the AP
Authentication feature. See “Configuring 802.1X AP Authentication” on
page 7-53 for more information.
Encryption
The AP 530 supports three types of encryption:
■
Wired Equivalent Privacy (WEP): Key lengths of 64 bits and 128 bits are
possible. WEP provides the least secure method of encryption (static WEP
is not secure, because it can be easily compromised).
■
Temporal Key Integrity Protocol (TKIP): Intermediate security between
WEP and AES with a key length of 256 bits. Provides a more secure
method of encryption than WEP (security is much better than WEP, but
not as robust as CCMP).
■
Counter mode/CBC-MAC Protocol (CCMP): Robust security with a key
length of 128 bits. Provides the most secure method of encryption.
Wired Equivalent Privacy (WEP)
WEP provides a basic level of security, preventing unauthorized access to the
network and encrypting data transmitted between wireless stations and the
access point.
WEP is the security protocol initially specified in the IEEE 802.11 standard
for wireless communications. Unfortunately, static WEP has been found to be
seriously flawed and cannot be recommended for a high level of network
security. For improved wireless security, the access point provides more
robust data encryption methods like TKIP and AES.
Temporal Key Integrity Protocol (TKIP)
TKIP avoids the problems of WEP static keys by dynamically changing data
encryption keys. TKIP starts with a master (temporal) key for each user
session and then mathematically generates other keys to encrypt each data
packet.
TKIP provides further data encryption enhancements by including a message
integrity check for each packet and a re-keying mechanism, that periodically
changes the master key.
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......