
USER MANUAL OF WEBEE WIRELESS N ROUTER
Version:1.1
Firmware Type 2
P/N: 60291092
80
DWL-120 USB 802.11b adapter). Generally if your client hardware supports operation
with SSID disabled, it's not a bad idea to run that way to enhance network security.
However it's no replacement for WEP, MAC filtering or other protections.
6.15.
WHAT IS WI-FI PROTECTED ACCESS (WPA)?
Wi-Fi’s original security mechanism, Wired Equivalent Privacy (WEP), has been viewed
as insufficient for securing confidential business communications. A longer-term solution,
the IEEE 802.11i standard, is under development. However, since the IEEE 802.11i
standard is not expected to be published until the end of 2003, several members of the
WI-Fi Alliance teamed up with members of the IEEE 802.11i task group to develop a
significant near-term enhancement to Wi-Fi security. Together, this team developed Wi-
Fi Protected Access.
To upgrade a WLAN network to support WPA, Access Points will require a WPA
software upgrade. Clients will require a software upgrade for the network interface card,
and possibly a software update for the operating system. For enterprise
networks, an
authentication server, typically one that supports RADIUS and the selected EAP
authentication protocol, will be added to the network.
6.16.
WHAT IS WPA2?
It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i
amendment to the 802.11 standard.
6.17.
WHAT IS 802.1X AUTHENTICATION?
802.1x is a framework for authenticated MAC-level access control, defines Extensible
Authentication Protocol (EAP) over LANs (WAPOL). The standard encapsulates and
leverages much of EAP, which was defined for dial-up authentication with Point-to-Point
Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL
messages that convey the shared key information critical for wireless security.
6.18.
WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)?
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i
encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired
Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides per-
packet key mixing, a message integrity check and a re-keying mechanism, thus fixing
the flaws of WEP.
6.19.
WHAT IS ADVANCED ENCRYPTION STANDARD (AES)?
Security issues are a major concern for wireless LANs, AES is the U.S. government’s
next-generation cryptography algorithm, which will replace DES and 3DES.
Содержание Wireless N Router with 3G Modem Support
Страница 1: ...User Manual v 1 1 Wireless N Router with 3G Modem Support...
Страница 15: ...USER MANUAL OF WEBEE WIRELESS N ROUTER Version 1 1 Firmware Type 2 P N 60291092 15...
Страница 29: ...USER MANUAL OF WEBEE WIRELESS N ROUTER Version 1 1 Firmware Type 2 P N 60291092 29...
Страница 46: ...USER MANUAL OF WEBEE WIRELESS N ROUTER Version 1 1 Firmware Type 2 P N 60291092 46 PPTP Item Description...
Страница 69: ...USER MANUAL OF WEBEE WIRELESS N ROUTER Version 1 1 Firmware Type 2 P N 60291092 69...
Страница 87: ...USER MANUAL OF WEBEE WIRELESS N ROUTER Version 1 1 Firmware Type 2 P N 60291092 87...