Glossary
file:///C|/Documents%20and%20Settings/dcobb1/Desktop/Holbert%2014.0%20Proset%20User%20Guide/html/glossary.htm[9/24/2010 5:51:51 PM]
upon the security features of WEP as follows:
Improved data encryption through the temporal key integrity protocol (TKIP). TKIP uses a
hashing algorithm to scramble the encryption keys and adds an integrity-checking feature
to ensure that the keys have not been tampered with.
User authentication, which is generally missing in WEP, through the extensible
authentication protocol (EAP). WEP regulates access to a wireless network based on a
computer's hardware-specific MAC address, which is relatively simple to be sniffed out and
stolen. EAP is built on a more secure public-key encryption system to ensure that only
authorized network users can access the network.
WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its
completion.
WPA-Personal
Wi-Fi Protected Access-Personal provides a level of security in the small network or home
environment.
WPA-PSK (Wi-
Fi Protected-
Access Pre-
Shared Key)
WPA-PSK mode does not use an authentication server. It can be used with the data encryption
types WEP or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK). You must enter
a pass phrase or 64 hex characters for a pre-shared key of length 256-bits. The data encryption
key is derived from the PSK.
Back to Top
Back to Contents
Trademarks and Disclaimers