Appendix D Wireless LANs
VMG4380-B10A / VMG4325-B10A User’s Guide
339
WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a
wireless security standard that defines stronger encryption, authentication and key management
than WPA.
Key differences between WPA or WPA2 and WEP are improved data encryption and user
authentication.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use
WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use
WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into
each access point, wireless gateway and wireless client. As long as the passwords match, a wireless
client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on
whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less
secure than WPA or WPA2.
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity
Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for compatibility reasons, but
offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter
mode with Cipher block chaining Message authentication code Protocol (CCMP).
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm
called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check
(MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is
never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key
hierarchy and management system, using the PMK to dynamically generate unique data encryption
keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless
clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets,
altering them and resending them. The MIC provides a strong mathematical function in which the
receiver and the transmitter each compute and then compare the MIC. If they do not match, it is
assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference
between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force
Содержание VMG4325-B10A
Страница 4: ...Contents Overview VMG4380 B10A VMG4325 B10A User s Guide 4 Troubleshooting 283 ...
Страница 14: ...Table of Contents VMG4380 B10A VMG4325 B10A User s Guide 14 ...
Страница 15: ...15 PART I User s Guide ...
Страница 16: ...16 ...
Страница 24: ...Chapter 1 Introducing the Device VMG4380 B10A VMG4325 B10A User s Guide 24 ...
Страница 37: ...Chapter 4 Tutorials VMG4380 B10A VMG4325 B10A User s Guide 37 7 Click Apply to save your settings ...
Страница 69: ...69 PART II Technical Reference ...
Страница 70: ...70 ...
Страница 178: ...Chapter 10 Quality of Service QoS VMG4380 B10A VMG4325 B10A User s Guide 178 ...
Страница 204: ...Chapter 13 Interface Group VMG4380 B10A VMG4325 B10A User s Guide 204 ...
Страница 220: ...Chapter 15 Firewall VMG4380 B10A VMG4325 B10A User s Guide 220 ...
Страница 226: ...Chapter 17 Parental Control VMG4380 B10A VMG4325 B10A User s Guide 226 ...
Страница 236: ...Chapter 19 Certificates VMG4380 B10A VMG4325 B10A User s Guide 236 ...
Страница 240: ...Chapter 20 Log VMG4380 B10A VMG4325 B10A User s Guide 240 ...
Страница 244: ...Chapter 21 Traffic Status VMG4380 B10A VMG4325 B10A User s Guide 244 ...
Страница 250: ...Chapter 24 IGMP Status VMG4380 B10A VMG4325 B10A User s Guide 250 ...
Страница 254: ...Chapter 25 xDSL Statistics VMG4380 B10A VMG4325 B10A User s Guide 254 ...
Страница 256: ...Chapter 26 User Account VMG4380 B10A VMG4325 B10A User s Guide 256 ...
Страница 262: ...Chapter 29 TR 064 VMG4380 B10A VMG4325 B10A User s Guide 262 ...
Страница 266: ...Chapter 30 Time Settings VMG4380 B10A VMG4325 B10A User s Guide 266 ...
Страница 272: ...Chapter 32 Logs Setting VMG4380 B10A VMG4325 B10A User s Guide 272 ...
Страница 290: ...Chapter 36 Troubleshooting VMG4380 B10A VMG4325 B10A User s Guide 290 ...
Страница 330: ...Appendix C Pop up Windows JavaScripts and Java Permissions VMG4380 B10A VMG4325 B10A User s Guide 330 ...
Страница 344: ...Appendix D Wireless LANs VMG4380 B10A VMG4325 B10A User s Guide 344 ...