
Appendix C Wireless LANs
User’s Guide
321
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK
depending on whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2.
WEP is less secure than WPA or WPA2.
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP),
Message Integrity Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when
required for compatibility reasons, but offers stronger encryption than TKIP with
Advanced Encryption Standard (AES) in the Counter mode with Cipher block
chaining Message authentication code Protocol (CCMP).
TKIP uses 128-bit keys that are dynamically generated and distributed by the
authentication server. AES (Advanced Encryption Standard) is a block cipher that
uses a 256-bit mathematical algorithm called Rijndael. They both include a per-
packet key mixing function, a Message Integrity Check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same
encryption key is never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that
then sets up a key hierarchy and management system, using the PMK to
dynamically generate unique data encryption keys to encrypt every data packet
that is wirelessly communicated between the AP and the wireless clients. This all
happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from
capturing data packets, altering them and resending them. The MIC provides a
strong mathematical function in which the receiver and the transmitter each
compute and then compare the MIC. If they do not match, it is assumed that the
data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating
an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to
decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break
into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The
only difference between the two is that WPA(2)-PSK uses a simple common
password, instead of user-specific credentials. The common-password approach
makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it’s
still an improvement over WEP as it employs a consistent, single, alphanumeric
password to derive a PMK which is used to generate unique temporal encryption
Содержание MAX-306
Страница 2: ......
Страница 8: ...Safety Warnings User s Guide 8...
Страница 10: ...Contents Overview User s Guide 10...
Страница 30: ...30...
Страница 36: ...Chapter 1 Getting Started User s Guide 36...
Страница 46: ...Chapter 2 Introducing the Web Configurator User s Guide 46...
Страница 64: ...Chapter 4 VoIP Connection Wizard User s Guide 64...
Страница 65: ...65 PART II Basic Screens The Main Screen 40 The Setup Screens 67...
Страница 66: ...66...
Страница 74: ...74...
Страница 88: ...Chapter 6 The LAN Configuration Screens User s Guide 88...
Страница 112: ...Chapter 8 The Wi Fi Configuration Screens User s Guide 112...
Страница 134: ...Chapter 10 The NAT Configuration Screens User s Guide 134...
Страница 145: ...145 PART IV Voice Screens The Service Configuration Screens 147 The Phone Screens 165 The Phone Book Screens 175...
Страница 146: ...146...
Страница 164: ...Chapter 12 The Service Configuration Screens User s Guide 164...
Страница 180: ...Chapter 14 The Phone Book Screens User s Guide 180...
Страница 182: ...182...
Страница 202: ...Chapter 15 The Certificates Screens User s Guide 202...
Страница 212: ...Chapter 16 The Firewall Screens User s Guide 212...
Страница 226: ...Chapter 18 The Remote Management Screens User s Guide 226...
Страница 242: ...Chapter 19 The Logs Screens User s Guide 242...
Страница 252: ...Chapter 20 The UPnP Screen User s Guide 252...
Страница 265: ...265 PART VI Troubleshooting and Specifications Troubleshooting 267 Product Specifications 275...
Страница 266: ...266...
Страница 274: ...Chapter 22 Troubleshooting User s Guide 274...
Страница 278: ...278...
Страница 310: ...Appendix B Setting Up Your Computer s IP Address User s Guide 310...
Страница 336: ...Appendix D Pop up Windows JavaScripts and Java Permissions User s Guide 336...
Страница 380: ...Appendix F Importing Certificates User s Guide 380...
Страница 382: ...Appendix G SIP Passthrough User s Guide 382...
Страница 398: ...Appendix J Customer Support User s Guide 398...
Страница 405: ...Index User s Guide 405...