When To Use Wpa Enterprise - Psion Teklogix 9160 G2 User Manual

Wireless gateway
Hide thumbs Also See for 9160 G2:
Table of Contents

Advertisement

This security mode is backwards-compatible for wireless clients that support only the origi-
nal WPA.
Table 10.3 WPA Personal Security Mode
Key Management
WPA Personal provides dynami-
cally-generated keys that are
periodically refreshed.
There are different Unicast keys
for each station.
Recommendations
WPA Personal is not recommended for use with the 9160 G2 Wireless Gateway when WPA
Enterprise is an option.
We recommend that you use WPA Enterprise mode instead, unless you have interoperability
issues that prevent you from using this mode.
For example, some devices on your network may not support WPA or WPA2 with EAP
talking to a RADIUS server. Embedded printer servers or other small client devices with
very limited space for implementation may not support RADIUS. For such cases, we recom-
mend that you use WPA Personal.
See Also
For information on how to configure this security mode, see "WPA Personal" on page 111.

10.1.2.5 When To Use WPA Enterprise

Wi-Fi Protected Access Enterprise with Remote Authentication Dial-In User Service (RA-
DIUS) is an implementation of the Wi-Fi Alliance IEEE 802.11h standard, which includes
Advanced Encryption Standard (AES), Counter mode/CBC-MAC Protocol (CCMP), and
Temporal Key Integrity Protocol (TKIP) mechanisms. This mode requires the use of a
RADIUS server to authenticate users. WPA Enterprise provides the best security available
for wireless networks.
This security mode also provides backwards-compatibility for wireless clients that support
only the original WPA.
Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms
Encryption Algorithms
• Temporal Key Integrity Protocol
(TKIP).
• Counter mode/CBC-MAC Protocol
(CCMP) Advanced Encryption
Standard (AES).
Psion Teklogix 9160 G2 Wireless Gateway User Manual
Chapter 10: Configuring Security
User Authentication
The use of a Pre-Shared (PSK) key provides
user authentication similar to that of shared keys
in WEP.
97

Advertisement

Table of Contents
loading

Table of Contents