
G-3000H User’s Guide
Appendix G Wireless LANs
251
The following table is a comparison of the features of authentication types.
WPA(2)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA 2 (IEEE
802.11i) is a wireless security standard that defines stronger encryption, authentication and
key management than WPA.
Key differences between WPA(2) and WEP are improved data encryption and user
authentication.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to TKIP, WPA2 also
uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining
Message authentication code Protocol (CCMP) to offer stronger encryption.
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and
distributed by the authentication server. It includes a per-packet key mixing function, a
Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with
sequencing rules, and a re-keying mechanism.
TKIP regularly changes and rotates the encryption keys so that the same encryption key is
never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP
that then sets up a key hierarchy and management system, using the pair-wise key to
dynamically generate unique data encryption keys to encrypt every data packet that is
wirelessly communicated between the AP and the wireless clients. This all happens in the
background automatically.
WPA2 AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit
mathematical algorithm called Rijndael.
Table 94
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate – Client
No
Yes
Optional
Optional
No
Certificate – Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity Protection
No
No
Yes
Yes
No
Содержание ZyAIR G-3000H
Страница 1: ...G 3000H 802 11g Wireless Access Point User s Guide Version 3 50 1 2006 ...
Страница 22: ...G 3000H User s Guide 22 List of Figures ...
Страница 26: ...G 3000H User s Guide 26 List of Tables ...
Страница 114: ...G 3000H User s Guide 114 Chapter 9 VLAN ...
Страница 134: ...G 3000H User s Guide 134 Chapter 11 Certificates ...
Страница 164: ...G 3000H User s Guide 164 Chapter 15 Introducing the SMT ...
Страница 180: ...G 3000H User s Guide 180 Chapter 17 LAN Setup ...
Страница 218: ...G 3000H User s Guide 218 Chapter 24 System Maintenance and Information ...
Страница 224: ...G 3000H User s Guide 224 Appendix C Power over Ethernet PoE Specifications ...
Страница 226: ...G 3000H User s Guide 226 Appendix D Brute Force Password Guessing Protection ...
Страница 238: ...G 3000H User s Guide 238 Appendix E Setting up Your Computer s IP Address ...
Страница 242: ...G 3000H User s Guide 242 Appendix F IP Address Assignment Conflicts ...
Страница 254: ...G 3000H User s Guide 254 Appendix G Wireless LANs ...
Страница 262: ...G 3000H User s Guide 262 Appendix H IP Subnetting ...
Страница 264: ...G 3000H User s Guide 264 Appendix I Command Interpreter ...
Страница 268: ...G 3000H User s Guide 268 Appendix J Log Descriptions ...
Страница 272: ...G 3000H User s Guide 272 Appendix L Power Adaptor Specifications ...
Страница 280: ...G 3000H User s Guide 280 Appendix M Text File Based Auto Configuration ...
Страница 294: ...G 3000H User s Guide 294 Appendix N Wireless LAN Manager ...
Страница 299: ...G 3000H User s Guide Index 299 ZyNOS F W Version 196 zyxel prowireless mib 287 ...