![Z-Com XN-790 Скачать руководство пользователя страница 29](http://html1.mh-extra.com/html/z-com/xn-790/xn-790_user-manual_3078291029.webp)
29
3.2.3.1 Encryption Mode
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message
Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in the
Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer
stronger encryption than TKIP.
The encryption mechanism used for WPA(2) and WPA(2)-PSK are the same. The only difference
between them is that WPA(2)-PSK uses a simple common password, instead of user specific
credentials. The common password approach makes WPA(2)-PSK susceptible to brute-force
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent,
single, alphanumeric password to derive a PMK which is used to generate unique temporal
encryption keys.
3.2.3.2 IEEE 802.1X Authentication
WPA and WPA2 apply IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate
wireless stations using an external RADIUS database. WPA2 reduces the number of key
exchange messages from six to four (CCMP 4 way handshake) and shortens the time required to
Содержание XN-790
Страница 16: ...16 Step 4 Click Next to accept the default file location or click Browse to select an alternate folder ...
Страница 20: ...20 Step 12 Click Finish to complete the installation ...
Страница 33: ...33 ...
Страница 39: ...39 ...