
Appendix E Wireless LANs
User
’
s Guide
259
If this feature is enabled, it is not necessary to configure a default encryption key
in the Wireless screen. You may still configure and store keys here, but they will
not be used while Dynamic WEP is enabled.
Note: EAP-MD5 cannot be used with dynamic WEP key exchange
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and
PEAP) use dynamic keys for data encryption. They are often deployed in corporate
environments, but for public deployment, a simple user name and password pair
is more practical. The following table is a comparison of the features of
authentication types.
WPA(2)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2
(IEEE 802.11i) is a wireless security standard that defines stronger encryption,
authentication and key management than WPA.
Key differences between WPA(2) and WEP are improved data encryption and user
authentication.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity
Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to
TKIP, WPA2 also uses Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP) to offer
stronger encryption.
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically
generated and distributed by the authentication server. It includes a per-packet
key mixing function, a Message Integrity Check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
Table 82
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate
–
Client
No
Yes
Optional
Optional
No
Certificate
–
Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity
Protection
No
No
Yes
Yes
No
C
om
pan
y
C
on
fiden
tial
Содержание NBG-417N
Страница 9: ...Contents Overview User s Guide 10 C o m p a n y C o n f i d e n t i a l...
Страница 17: ...Table of Contents User s Guide 18 C o m p a n y C o n f i d e n t i a l...
Страница 19: ...20 C o m p a n y C o n f i d e n t i a l...
Страница 23: ...Chapter 1 Introduction User s Guide 24 C o m p a n y C o n f i d e n t i a l...
Страница 25: ...Chapter 2 The WPS Button User s Guide 26 C o m p a n y C o n f i d e n t i a l...
Страница 37: ...Chapter 3 The Web Configurator User s Guide 38 C o m p a n y C o n f i d e n t i a l...
Страница 53: ...Chapter 4 Connection Wizard User s Guide 54 C o m p a n y C o n f i d e n t i a l...
Страница 61: ...Chapter 5 AP Mode User s Guide 62 C o m p a n y C o n f i d e n t i a l...
Страница 77: ...Chapter 6 Tutorials User s Guide 78 C o m p a n y C o n f i d e n t i a l...
Страница 79: ...80 C o m p a n y C o n f i d e n t i a l...
Страница 117: ...Chapter 9 LAN User s Guide 118 C o m p a n y C o n f i d e n t i a l...
Страница 123: ...Chapter 10 DHCP Server User s Guide 124 C o m p a n y C o n f i d e n t i a l...
Страница 137: ...Chapter 12 DDNS User s Guide 138 C o m p a n y C o n f i d e n t i a l...
Страница 138: ...139 PART III Security Firewall 141 Content Filtering 147 C o m p a n y C o n f i d e n t i a l...
Страница 139: ...140 C o m p a n y C o n f i d e n t i a l...
Страница 145: ...Chapter 13 Firewall User s Guide 146 C o m p a n y C o n f i d e n t i a l...
Страница 151: ...152 C o m p a n y C o n f i d e n t i a l...
Страница 155: ...Chapter 15 Static Route User s Guide 156 C o m p a n y C o n f i d e n t i a l...
Страница 167: ...Chapter 17 Remote Management User s Guide 168 C o m p a n y C o n f i d e n t i a l...
Страница 177: ...Chapter 18 UPnP User s Guide 178 C o m p a n y C o n f i d e n t i a l...
Страница 179: ...180 C o m p a n y C o n f i d e n t i a l...
Страница 185: ...Chapter 19 System User s Guide 186 C o m p a n y C o n f i d e n t i a l...
Страница 197: ...Chapter 22 Sys OP Mode User s Guide 198 C o m p a n y C o n f i d e n t i a l...
Страница 199: ...Chapter 23 Language User s Guide 200 C o m p a n y C o n f i d e n t i a l...
Страница 207: ...Chapter 24 Troubleshooting User s Guide 208 C o m p a n y C o n f i d e n t i a l...
Страница 209: ...210 C o m p a n y C o n f i d e n t i a l...
Страница 213: ...Appendix A Product Specifications User s Guide 214 C o m p a n y C o n f i d e n t i a l...
Страница 279: ...Index User s Guide 280 C o m p a n y C o n f i d e n t i a l...