Cisco LEAP
Cisco Rogue Access Point Security Feature
802.11b and 802.11g Mixed Environment Protection Protocol
CKIP
Fast Roaming (CCKM)
Radio Management
Protecting Your WiFi Network
Your wireless network, if left unprotected, is vulnerable to access from other computers. You can easily protect
your home and small business network from nearly all forms of unauthorized access with the security methods
described in this section.
Authentication
Authentication is the process of identifying and approving a request from a client (usually a laptop) to access a
network at a network access point. Once authentication is completed and access is granted, the client has access
to the network.
Encryption
You can select encryption algorithms to encrypt the information and data that is sent across your wireless
network. Only computers equipped with pre-shared keys can encrypt and decrypt the data being transmitted.
Encryption keys are available with two levels of security, 64-bit and 128-bit. Use 128-bit keys for greater security.
SSID Broadcasting
A simple way to improve network security is to set your network access point to
not broadcast
the Service Set
Identifier (SSID). The SSID is needed to gain access. Only those computers with knowledge of the SSID can
access the network. (This is
not
set at the adapter using the Intel® PROSet/Wireless WiFi Connection Utility, it is
set at the access point.)
Personal Security Methods
Open and Shared Network Authentication
IEEE 802.11 supports two types of network authentication methods: Open System and Shared Key.
When
open
authentication is used, any wireless station can request authentication. The station that needs to
authenticate with another wireless station sends an authentication management request that contains the
identity of the sending station. The receiving station or access point grants any request for authentication.
Open authentication allows any device to gain network access.
If no encryption is enabled on the network,
any device that knows the Service Set Identifier (SSID) of the access point can gain access to the network.
When
shared key
authentication is used, each wireless station is assumed to have received a secret shared
key over a secure channel that is independent from the 802.11 wireless network communications channel.
You can share this secret key via a wired Ethernet connection, or by physically using a USB memory stick or
CD. Shared key authentication requires that the client configure a static WEP key. The client access is
granted only if it passes a challenge-based authentication.
WEP
Wired Equivalent Privacy (WEP) uses encryption to help prevent unauthorized reception of wireless data. WEP uses
an
encryption key
to encrypt data before transmitting it. Only computers that use the same encryption key can
access the network and decrypt the data transmitted by other computers. WEP encryption provides for two levels
of security, using a 64-bit key (sometimes referred to as 40-bit) or a 128-bit key (also known as 104-bit). For
stronger security, you should use a 128-bit key. If you use encryption, all wireless devices on your wireless
network must use the same encryption keys.
Intel® PROSet/Wireless WiFi Connection Utility User's Guide
Содержание 512AN_HMW
Страница 59: ...Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 105: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 136: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...