Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms; Comparison Of Security Modes For Key Management, Authentica- Tion And Encryption Algorithms - Psion Teklogix 9160 G2 User Manual

Wireless gateway
Hide thumbs Also See for 9160 G2:
Table of Contents

Advertisement

Chapter 10: Configuring Security

Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms

That said, however, security may not be as much of a priority on some types of
networks. If you are simply providing internet and printer access, as on a guest net-
work, setting the security mode to None (Plain-text) may be the appropriate choice.
To prevent clients from accidentally discovering and connecting to your network,
you can disable the broadcast SSID so that your network name is not advertised. If
the network is sufficiently isolated from access to sensitive information, this may
offer enough protection in some situations. This level of protection is the only one
offered for guest networks, and also may be the right convenience trade-off for other
scenarios where the priority is making it as easy as possible for clients to connect.
(See "Does Prohibiting The Broadcast SSID Enhance Security?" on page 98)
Following is a brief discussion of what factors make one mode more secure than
another, a description of each mode offered, and when to use each mode.
10.1.2 Comparison Of Security Modes For Key Management,
Authentication And Encryption Algorithms
Three major factors that determine the effectiveness of a security protocol are:
How the protocol manages keys.
Presence or absence of integrated user authentication in the protocol.
Encryption algorithm or formula the protocol uses to encode/decode
the data.
Following is a list of the security modes available on the 9160 G2 Wireless Gate-
way, along with a description of the key management, authentication, and encryp-
tion algorithms used in each mode. We include some suggestions as to when one
mode might be more appropriate than another.
"When To Use Unencrypted (No Security)" on page 93.
"When To Use Static WEP" on page 93.
"When To Use IEEE 802.1x" on page 94.
"When To Use WPA Personal" on page 95.
"When To Use WPA Enterprise" on page 96.
92
Psion Teklogix 9160 G2 Wireless Gateway User Manual

Advertisement

Table of Contents
loading

Table of Contents