Appendix B Wireless LANs
XMG3512-B10A User’s Guide
266
2
The AP checks each wireless client's password and allows it to join the network only if the password
matches.
3
The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over
the network, but is derived from the PSK and the SSID.
4
The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged
in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged
between them.
Figure 169
WPA(2)-PSK Authentication
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication
method or key management protocol type. MAC address filters are not dependent on how you
configure these security features.
Table 128 Wireless Security Relational Matrix
AUTHENTICATION METHOD/
KEY MANAGEMENT
PROTOCOL
ENCRYPTION
METHOD
ENTER MANUAL
KEY
IEEE 802.1X
Open
None
No
Disable
Enable without Dynamic WEP Key
Open
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
Shared
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
WPA
TKIP/AES
No
Enable
WPA-PSK
TKIP/AES
Yes
Disable
WPA2
TKIP/AES
No
Enable
WPA2-PSK
TKIP/AES
Yes
Disable
Содержание XMG3512-B10A
Страница 14: ...14 PART I User s Guide ...
Страница 23: ...Chapter 1 Introducing the XMG XMG3512 B10A User s Guide 23 Figure 8 Wall Mounting Example ...
Страница 33: ...Chapter 3 Quick Start XMG3512 B10A User s Guide 33 Figure 16 Quick Start Result Summary ...
Страница 56: ...56 PART II Technical Reference ...
Страница 139: ...Chapter 10 Quality of Service QoS XMG3512 B10A User s Guide 139 Figure 71 Classification Setup Add Edit ...
Страница 249: ...249 PART III Appendices Appendices contain general information Some information may not apply to your device ...
Страница 279: ...Appendix D Legal Information XMG3512 B10A User s Guide 279 Environmental Product Declaration ...