SMC Networks 2552W-G User Manual page 212

2.4ghz 802.11g wireless access point
Hide thumbs Also See for 2552W-G:
Table of Contents

Advertisement

Command Line Interface
Command Usage
Wi-Fi Protected Access (WPA) provides improved data
encryption, which was weak in WEP, and user authentication,
which was largely missing in WEP. WPA uses the following
security mechanisms.
Enhanced Data Encryption through TKIP
WPA uses Temporal Key Integrity Protocol (TKIP). TKIP
provides data encryption enhancements including per-packet
key hashing (i.e., changing the encryption key on each
packet), a message integrity check, an extended initialization
vector with sequencing rules, and a re-keying mechanism.
Enterprise-level User Authentication via 802.1x and EAP
To strengthen user authentication, WPA uses 802.1x and the
Extensible Authentication Protocol (EAP). Used together,
these protocols provide strong user authentication via a central
RADIUS authentication server that authenticates each user on
the network before they join it. WPA also employs "mutual
authentication" to prevent a wireless client from accidentally
joining a rogue network.
Example
SMC-AP(if-wireless g)#wpa-client required
SMC-AP(if-wireless g)#
Related Commands
wpa-mode (page 6-91)
6-90

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eliteconnect smc2552w-g

Table of Contents