Honeywell OW-CDX050 User Manual page 66

Table of Contents

Advertisement

Configuration
Wireless Access Point Configuration
ratio encountered, and the time the user crossed into the network's space. These utilities
can be used to determine whether your network is unsecured.
IEEE 802.11i and WPA (Recommended)
Wi-Fi Protected Access (WPA) is designed to enable use of wireless legacy systems
employing WEP while improving security. WPA uses improved data encryption through
the Temporal Key Integrity Protocol (TKIP) which scrambles keys using a hashing
algorithm and, by adding an integrity-checking feature to ensure that the keys have not
been tampered with. Additionally, user authentication is enabled using the Extensible
Authentication Protocol (EAP).
Choosing the IEEE 802.11i and WPA Security Method will call up the following screen:
54
OneWireless Multinode User's Guide
R110
6/08

Advertisement

Table of Contents
loading

Table of Contents