SMC Networks EliteConnect SMCE21011 User Manual page 255

802.11b/g/n ap
Hide thumbs Also See for EliteConnect SMCE21011:
Table of Contents

Advertisement

T
K
EMPORAL
EY
I
P
NTEGRITY
ROTOCOL
(TKIP)
T
F
T
RIVIAL
ILE
RANSFER
P
(TFTP)
ROTOCOL
V
A
P
IRTUAL
CCESS
OINT
(VAP)
W
-F
P
I
I
ROTECTED
A
CCESS
W
E
IRED
QUIVALENT
P
(WEP)
RIVACY
WPA P
-
K
RE
SHARED
EY
(WPA-PSK)
A data encryption method designed as a replacement for WEP. TKIP avoids
the problems of WEP static keys by dynamically changing data encryption
keys.
A TCP/IP protocol commonly used for software downloads.
Virtual AP technology multiplies the number of Access Points present within
the RF footprint of a single physical access device. With Virtual AP
technology, WLAN users within the device.s footprint can associate with
what appears to be different access points and their associated network
services. All the services are delivered using a single radio channel,
enabling Virtual AP technology to optimize the use of limited WLAN radio
spectrum.
WPA employs 802.1X as its basic framework for user authentication and
dynamic key management to provide an enhanced security solution for
802.11 wireless networks.
WEP is based on the use of security keys and the popular RC4 encryption
algorithm. Wireless devices without a valid WEP key will be excluded from
network traffic.
WPA-PSK can be used for small office networks with a limited number of
users that may not need a high level of security. WPA-PSK provides a
simple security implementation that uses just a pre-shared password for
network access.
– 255 –
G
LOSSARY

Advertisement

Table of Contents
loading

Table of Contents