Wpa2-Ccmp (802.11I) Encryption; Firewall Security; Vpn Tunnels - Motorola AP-7131 Product Reference Manual

Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

1-10
AP-7131 Access Point Product Reference Guide
• a message integrity check
• an extended initialization vector with sequencing rules
• a re-keying mechanism
WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs 802.1X
and Extensible Authentication Protocol (EAP).
For detailed information on WPA using TKIP configurations, see
on page
6-20.

1.1.12.6 WPA2-CCMP (802.11i) Encryption

WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected
Access (WPA) and WEP. Counter-mode/CBC-MAC Protocol (CCMP) is the security standard used by
the Advanced Encryption Standard (AES). AES serves the same function TKIP does for WPA-TKIP.
CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Message
Authentication Code (CBC-MAC) technique. Changing just one bit in a message produces a totally
different result.
WPA2-CCMP is based on the concept of a Robust Security Network (RSN), which defines a hierarchy
of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used
to derive other keys. Messages are encrypted using a 128-bit secret key and a 128-bit block of data.
The end result is an encryption scheme as secure as any the access point provides.
For detailed information on WPA2-CCMP, see

1.1.12.7 Firewall Security

A firewall keeps personal data in and hackers out. The access point's firewall prevents suspicious
Internet traffic from proliferating the access point managed network. The access point performs
Network Address Translation (NAT) on packets passing to and from the WAN port. This combination
provides enhanced security by monitoring communication with the wired network.
For detailed information on configuring the access point's firewall, see
on page
6-26.

1.1.12.8 VPN Tunnels

Virtual Private Networks (VPNs) are IP-based networks using encryption and tunneling providing
users remote access to a secure LAN. In essence, the trust relationship is extended from one LAN
across the public network to another LAN, without sacrificing security. A VPN behaves like a private
Configuring WPA/WPA2 Using TKIP
Configuring WPA2-CCMP (802.11i) on page
6-23.
Configuring Firewall Settings

Advertisement

Table of Contents
loading

Table of Contents