Appendix C Wireless LANs
4
The AP and wireless client s use t he TKI P or AES encrypt ion process, t he PMK and inform at ion
exchanged in a handshake t o creat e t em poral encrypt ion keys. They use t hese keys t o encrypt dat a
exchanged bet ween t hem .
Figure 127 WPA( 2) - PSK Aut hent icat ion
Security Parameters Summary
Refer t o t his t able t o see what ot her securit y param et ers you should configure for each
aut hent icat ion m et hod or key m anagem ent prot ocol t ype. MAC address filt ers are not dependent on
how you configure t hese securit y feat ures.
Table 118 Wireless Securit y Relat ional Mat rix
AUTHENTICATION
METHOD/ KEY
MANAGEMENT PROTOCOL
Open
Open
Shared
WPA
WPA- PSK
WPA2
WPA2- PSK
298
ENCRYPTIO
ENTER
N METHOD
MANUAL KEY
None
No
WEP
No
Yes
Yes
WEP
No
Yes
Yes
TKI P/ AES
No
TKI P/ AES
Yes
TKI P/ AES
No
TKI P/ AES
Yes
IEEE 802.1X
Disable
Enable wit hout Dynam ic WEP Key
Enable wit h Dynam ic WEP Key
Enable wit hout Dynam ic WEP Key
Disable
Enable wit h Dynam ic WEP Key
Enable wit hout Dynam ic WEP Key
Disable
Enable
Disable
Enable
Disable
NWA3000-N Series User's Guide