
P-661H/HW Series User’s Guide
364
Appendix K
WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE
802.11i) is a wireless security standard that defines stronger encryption, authentication and
key management than WPA.
Key differences between WPA or WPA2 and WEP are improved data encryption and user
authentication.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS
server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server,
you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical)
password entered into each access point, wireless gateway and wireless client. As long as the
passwords match, a wireless client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending
on whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is
less secure than WPA or WPA2.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced
Encryption Standard (AES) in the Counter mode with Cipher block chaining Message
authentication code Protocol (CCMP) to offer stronger encryption than TKIP.
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication
server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit
mathematical algorithm called Rijndael. They both include a per-packet key mixing function,
a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with
sequencing rules, and a re-keying mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption
key is never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up
a key hierarchy and management system, using the PMK to dynamically generate unique data
encryption keys to encrypt every data packet that is wirelessly communicated between the AP
and the wireless clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data
packets, altering them and resending them. The MIC provides a strong mathematical function
in which the receiver and the transmitter each compute and then compare the MIC. If they do
not match, it is assumed that the data has been tampered with and the packet is dropped.
Содержание P-661H Series
Страница 2: ......
Страница 5: ...P 661H HW Series User s Guide Certifications 5...
Страница 10: ...P 661H HW Series User s Guide 10 Customer Support...
Страница 43: ...P 661H HW Series User s Guide Chapter 1 Getting To Know Your ZyXEL Device 43 Figure 5 Connecting a Microfilter...
Страница 44: ...P 661H HW Series User s Guide 44 Chapter 1 Getting To Know Your ZyXEL Device...
Страница 76: ...P 661H HW Series User s Guide 76 Chapter 3 Wizards...
Страница 108: ...P 661H HW Series User s Guide 108 Chapter 5 LAN Setup...
Страница 132: ...P 661H HW Series User s Guide 132 Chapter 6 Wireless LAN...
Страница 191: ...P 661H HW Series User s Guide Chapter 10 Trend Micro Security Services 191 Figure 113 Security Setting ActiveX Controls...
Страница 192: ...P 661H HW Series User s Guide 192 Chapter 10 Trend Micro Security Services...
Страница 196: ...P 661H HW Series User s Guide 196 Chapter 11 Content Filtering...
Страница 202: ...P 661H HW Series User s Guide 202 Chapter 12 Introduction to IPSec...
Страница 230: ...P 661H HW Series User s Guide 230 Chapter 13 VPN Screens...
Страница 234: ...P 661H HW Series User s Guide 234 Chapter 14 Static Route...
Страница 246: ...P 661H HW Series User s Guide 246 Chapter 15 Bandwidth Management...
Страница 250: ...P 661H HW Series User s Guide 250 Chapter 16 Dynamic DNS Setup...
Страница 280: ...P 661H HW Series User s Guide 280 Chapter 19 System...
Страница 290: ...P 661H HW Series User s Guide 290 Chapter 21 Tools...
Страница 296: ...P 661H HW Series User s Guide 296 Chapter 23 Troubleshooting...
Страница 300: ...P 661H HW Series User s Guide 300 Appendix A...
Страница 304: ...P 661H HW Series User s Guide 304 Appendix C...
Страница 326: ...P 661H HW Series User s Guide 326 Appendix E...
Страница 328: ...P 661H HW Series User s Guide 328 Appendix F...
Страница 334: ...P 661H HW Series User s Guide 334 Appendix G...
Страница 368: ...P 661H HW Series User s Guide 368 Appendix K...
Страница 376: ...P 661H HW Series User s Guide 376 Figure 219 Java Sun...