19
WPA-PSK takes over automatically from that point, keeping
unauthorized users that don't have the matching password from
joining the network, while encrypting the data traveling between
authorized devices
WPA2-PSK –
WPA2-PSK is also for home and small business.
The difference between WPA-PSK and WPA2-PSK is that
WPA2-PSK provides data encryption via the AES. In contrast,
WPA-PSK uses Temporal Key Integrity Protocol (TKIP)
WPA –
WPA provides a scheme of mutual authentication using
either IEEE 802.1x / Extensible Authentication Protocol (EAP)
authentication or pre-shared key (PSK) technology. It provides a
high level of assurance to enterprises, small businesses and home
users that data will remain protected and that only authorized users
may access their networks. For enterprises that have already
deployed IEEE 802.1x authentication, WPA offers the advantage of
leveraging existing authentication databases and infrastructure.
WPA2
– Like WPA, WPA2 supports IEEE 802.1x / EAP
authentication or PSK technology. It also includes a new advanced
encryption mechanism using the Advanced Encryption Standard
(AES). AES is required to the corporate user or government users.
The difference between WPA and WPA2 is that WPA2 provides
data encryption via the AES. In contrast, WPA uses Temporal Key
Integrity Protocol (TKIP).
Encryption Method
Security Off
– Disable the encryption mode.
WEP
– Enable the WEP Data Encryption. When the item is
selected, you have to continue setting the WEP Encryption keys.
TKIP
– TKIP (Temporal Key Integrity Protocol) changes the
temporal key every 10,000 packets (a packet is a kind of message
transmitted over a network.) This insures much greater security
than the standard WEP security.
AES
– AES has been developed to ensure the highest degree of
security and authenticity for digital information and it is the most
advanced solution defined by IEEE 802.11i for the security in the
wireless network.
Note: All devices in the network should use the same encryption
method to ensure the communication.
802.1x Authentication
Protocol
The EAP authentication protocols this device has supported are
included as follows. This setting has to be consistent with the
wireless APs or Routers that the card intends to connect.
EAP/TLS (User Certificate)
–EAP/TLS is the most secure of the
Содержание WL-8316
Страница 1: ...I 802 11g Wireless PCI Adapter WL 8316 User Manual Version 1 00 ...
Страница 19: ...15 Figure 4 15 Figure 4 16 ...