Security Profiles - NETGEAR ProSAFE WNDAP380R Reference Manual

Prosafe dual band wireless-n access point with rfid support
Hide thumbs Also See for ProSAFE WNDAP380R:
Table of Contents

Advertisement

ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
WPA-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
WPA2 and WPA2-PSK (AES). Wi-Fi Protected Access version 2 (WPA2) data encryption
provides strong data security with Advanced Encryption Standard (AES) encryption. The
very strong authentication along with dynamic per-frame rekeying of WPA2 makes it
virtually impossible to compromise.
WPA2 uses RADIUS-based 802.1x authentication; for more information, see the following
sections:
-
Configure and Enable Security Profiles
-
Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 53
WPA2-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
WPA & WPA2 and WPA-PSK & WPA2-PSK mixed modes. These modes support data
encryption either with both WPA and WPA2 clients or with both WPA-PSK and
WPA2-PSK clients and provide the most reliable security.
WPA & WPA2 uses RADIUS-based 802.1x authentication; for more information, see the
following sections:
-
Configure and Enable Security Profiles
-
Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 53
WPA-PSK & WPA2-PSK uses a pre-shared key (PSK) for authentication; for more
information, see the following sections:
-
Configure and Enable Security Profiles
-
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK

Security Profiles

This section describes the main components of security profiles and explains how to
configure and enable security profiles.
Security Profile Concepts
Write Down Your Wireless Network Settings
Configure and Enable Security Profiles
on page 46
on page 46
on page 46
on page 46
on page 46
Wireless Configuration and Security
42
on page 54
on page 54
on page 54

Advertisement

Table of Contents
loading

Table of Contents