Security Profiles - NETGEAR ProSAFE WN203 Reference Manual

Prosafe single band 802.11n wireless access point wn203
Hide thumbs Also See for ProSAFE WN203:
Table of Contents

Advertisement

ProSAFE Single Band 802.11n Wireless Access Point WN203
WPA-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
WPA2 and WPA2-PSK (AES). Wi-Fi Protected Access version 2 (WPA2) data encryption
provides strong data security with Advanced Encryption Standard (AES) encryption. The
very strong authentication along with dynamic per-frame rekeying of WPA2 makes it
virtually impossible to compromise.
WPA2 uses RADIUS-based 802.1x authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 42
WPA2-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
WPA & WPA2 and WPA-PSK & WPA2-PSK mixed modes. These modes support data
encryption either with both WPA and WPA2 clients or with both WPA-PSK and
WPA2-PSK clients and provide the most reliable security.
WPA & WPA2 uses RADIUS-based 802.1x authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 42
WPA-PSK & WPA2-PSK uses a pre-shared key (PSK) for authentication; for more
information, see the following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK

Security Profiles

This section describes the main components of security profiles and explains how to
configure and enable security profiles.
Security Profile Concepts
Write Down Your Wireless Network Settings
Configure and Enable Security Profiles
on page 36
on page 36
on page 36
on page 36
on page 36
Wireless Configuration and Security
33
on page 43
on page 43
on page 43

Advertisement

Table of Contents
loading

Table of Contents