Figure 7-8. Wireless Security - Edge-Core vg007 Management Manual

Pocket voip gateway
Hide thumbs Also See for vg007:
Table of Contents

Advertisement

To configure wireless security click on Security.
• Encryption Type – Selects the data encryption method to use:
- None – No data encryption is used.
- Share – Use a WEP share key for encryption. If you choose to use WEP shared
keys, be sure to define at least one static WEP key. Also, be sure that the WEP
shared keys are the same for each client in the wireless network.
- 802.11X – Use IEEE 802.1X (802.1X) for user authentication and distributing
dynamically generated encryption keys. IEEE 802.1X is a standard framework
for network access control that uses a RADIUS server on the local network for
user authentication. The 802.1X standard uses the Extensible Authentication
Protocol (EAP) to pass user credentials (either digital certificates, usernames
and passwords, or other) from the client to the RADIUS server. The unit supports
TLS (Transport Layer Security) as its EAP type.
- TKIP – Use Temporal Key Integrity Protocol (TKIP) keys for encryption. WPA
specifies TKIP as the data encryption method to replace WEP. TKIP avoids the
problems of WEP static keys by dynamically changing data encryption keys.
- AES – Use Advanced Encryption Standard (AES) keys for encryption. WPA2
uses AES Counter-Mode encryption with Cipher Block Chaining Message
Authentication Code (CBC-MAC) for message integrity. The AES
Counter-Mode/CBCMAC Protocol (AES-CCMP) provides extremely robust data
confidentiality using a 128-bit key. Use of AES-CCMP encryption is specified as
a standard requirement for WPA2. Before implementing WPA2 in the network,
be sure client devices are upgraded to WPA2-compliant hardware.

Figure 7-8. Wireless Security

Wireless Security
7-5
7

Advertisement

Table of Contents
loading

Table of Contents