![MyTek MWA-105 Скачать руководство пользователя страница 54](http://html.mh-extra.com/html/mytek/mwa-105/mwa-105_user-manual_1863546054.webp)
MyTek
MWA-105 Access Point
Communication Ltd.
Version: 1.1
MyTek Communication Ltd. Tel: (36-1) 347-0446, (36-1) 280-9397
Vörösmarty utca 79. Budapest Fax: (36-1) 347-0447
Hungary H-1201
http://www.mytek.eu
47
4.17
What is 802.1x Authentication?
802.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication
Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which
was defined for dial-up authentication with Point-to-Point Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages that convey
the shared key information critical for wireless security.
4.18
What is Temporal Key Integrity Protocol (TKIP)?
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption
standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol,
which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message
integrity check and a re-keying mechanism, thus fixing the flaws of WEP.
4.19
What is Advanced Encryption Standard (AES)?
Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation
cryptography algorithm, which will replace DES and 3DES.
4.20
What is Inter-Access Point Protocol (IAPP)?
The IEEE 802.11f Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability,
enabling roaming of 802.11 Stations within IP subnet.
IAPP defines messages and data to be exchanged between Access Points and between the IAPP and
high layer management entities to support roaming. The IAPP protocol uses TCP for inter-Access
Point communication and UDP for RADIUS request/response exchanges. It also uses Layer 2 frames
to update the forwarding tables of Layer 2 devices.
4.21
What is Wireless Distribution System (WDS)?
The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless
channel, like the wireless bridge or repeater service.
4.22
What is Clone MAC Address?
Clone MAC address is designed for your special application that request the clients to register to a
server machine with one identified MAC address.
Since that all the clients will communicate outside world through the WLAN Access Point, so have
the cloned MAC address set on the WLAN Access Point will solve the issue.