What Is Wi-Fi Protected Access (Wpa); Whatiswpa2; What Is 802.1X Authentication; What Is Temporal Key Integrity Protocol (Tkip) - Rosewill RNX-G40 User Manual

Table of Contents

Advertisement

Wireless Router
RNX-G40
User Manual

4.15 What is Wi-Fi Protected Access (WPA)?

Wi-Fi's original security mechanism, Wired Equivalent Privacy (WEP), has been viewed as insufficient for
securing confidential business communications. A longer-term solution, the IEEE 802.Hi standard, is under
development. However, since the IEEE 802. Hi standard is not expected to be published until the end of
2003, several members of the Wi-Fi Alliance teamed up with members of the IEEE 802. Hi task group to
develop a significant near-term enhancement to Wi-Fi security. Together, this team developed Wi-Fi
Protected Access.
To upgrade a WLAN network to support WPA, Access Points will require a WPA software upgrade. Clients
will require a software upgrade for the network interface card, and possibly a software update for the
operating system. For enterprise networks, an authentication server, typically one that supports RADIUS and
the selected EAP authentication protocol, will be added to the network.

4.16 WhatisWPA2?

It is the second generation of WPA. WPA2 is based on the final IEEE 802.1H amendment to the 802.11
standard.
4.17 What is 802.lx Authentication?
802.lx is a framework for authenticated MAC-level access control, defines Extensible Authentication
Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which was
defined for dial-up authentication with Point-to-Point Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802. lx standard also defines EAPOL messages that convey the
shared key information critical for wireless security.

4.18 What is Temporal Key Integrity Protocol (TKIP)?

The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.Hi encryption standard for
wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure
802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying
mechanism, thus fixing the flaws of WEP.

4.19 What is Advanced Encryption Standard (AES)?

Security issues are a major concern for wireless LANs, AES is the U.S. government's next-generation
cryptography algorithm, which will replace DES and 3DES.

4.20 What is Inter-Access Point Protocol (IAPP)?

The IEEE 802.1 If Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability, enabling
roaming of 802.11 Stations within IP subnet.
IAPP defines messages and data to be exchanged between Access Points and between the IAPP and high
layer management entities to support roaming. The IAPP protocol uses TCP for inter-Access Point
communication and UDP for RADIUS request/response exchanges. It also uses Layer 2 frames to update
the forwarding tables of Layer 2 devices.

4.21 What is Wireless Distribution System (WDS)?

The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless channel,
like the wireless bridge or repeater service.

4.22 What is Universal Plug and Play (uPNP)?

UPnP is an open networking architecture that consists of services, devices, and control points. The ultimate
goal is to allow data communication among all UPnP devices regardless of media, operating system,
programming language, and wired/wireless connection.

4.23 What is Maximum Transmission Unit (MTU) Size?

Maximum Transmission Unit (MTU) indicates the network stack of any packet is larger than this value will be
fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate
its MRU and will be accepted. The actual MTU of the PPP connection will be set to the smaller one of MTU
and the peer's MRU. The default is value 1400.
- 53 -

Advertisement

Table of Contents
loading

Table of Contents