What Is Wi-Fi Protected Access (Wpa); What Is Wpa2; What Is 802.1X Authentication; What Is Temporal Key Integrity Protocol (Tkip) - Planet WNAP-6350 User Manual

802.11b/g/n wireless outdoor access point
Hide thumbs Also See for WNAP-6350:
Table of Contents

Advertisement

15. What is Wi-Fi
Protected Access (WPA)?
W
i-Fi's original security mechanism, Wired Equivalent Privacy (WEP), has been viewed as insufficient for
securing confidential business communications. A long
development. However, since the IEEE 802.11i standard is not expected to be published until the end of 2003,
several members of the WI-Fi Alliance
s
ignificant near-term enhancement to Wi-Fi security. Together, this team developed Wi-Fi Protected Access.
To upgrade a WLAN network to support WPA, Acc
require a software upgrade for the network interface card, and possibly a software update for the operating
system. For enterprise networks, an authentication server, typically one that supports RADIUS and the selected
EAP authentication protocol, will be added

16. What is WPA2?

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendment to the 802.11
standard.
17. What is 80
2.1x Authentication?
8
02.1x is a framework for authenticated MAC-level access control, defines Extensible Authentication Protocol
(EAP) over LANs (WAPOL). The stand
dial-up authentication with Point-to-Point Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages that convey the shared
key information critical for wireless security.
1

8. What is Temporal Key Integrity Protocol (TKIP)?

The Temporal Key Integ
wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure
802.11 wireless LANs. TK
m
echanism, thus fixing the flaws of WEP.

19. What is Advanced Encryption Standard (AES)?

Security issues are a major concern for
c
ryptography algorithm, which will replace DES and 3DES.

20. What is Inter-Access Point Protocol (IAPP)?

The IEEE 802.11f
Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability, enabling
ro
aming of 802.11 S
tations within IP subnet.
IAPP defines messages
management entities to support roaming. The IAPP protocol uses TCP for inter-Access P
a
nd UDP for RADIUS request/response exchanges. It also uses Layer 2 frames to update the forwarding tables
teamed up with members of the IEEE 802.11i task group to develop a
to the network.
ard encapsulates and leverages much of EAP, which was defined for
rity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryption standard for
IP provides per-packet key mixing, a message integrity check and a re-keying
wireless LANs, AES is the U.S. government's next-generation
and data to be exchanged between Access Points and between the IAPP and high layer
er-term solution, the IEEE 802.11i standard, is under
ess Points will require a WPA software upgrade. Clients will
-84-
User Manual of WNAP-6350
oint communication

Advertisement

Table of Contents
loading

Table of Contents