Wireless Encryption - iRobot Ava 500 Administrator's Manual

Hide thumbs Also See for Ava 500:
Table of Contents

Advertisement

Ava 500 IT Administrator's Guide
also in the guide called: "Wireless LAN Design Guide for High Density Client Environments" found here:
http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps10981/design_guide_c07-693245.pdf
and lastly, in a guide called "Site Survey Guide for Deploying Cisco 7920 IP Phones" written for Cisco VoIP
phones, but which still applies to video tasks:
http://www.cisco.com/en/US/docs/wireless/technology/7920/site_survey/guide/7920surv.pdf
Cisco's guide on QoS settings is entitled: "Optimizing Enterprise Video Over Wireless LAN" and is found here:
http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps10315/ps10325/white_paper_c11-
577721.pdf
Cisco's "Unified Wireless IP Phone Deployment Guide" is found here:
http://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/cuipph/7925g/7_0/english/deployment/guide/7925dply.
pdf
"Configure Enable Session Timeout as necessary per your requirements. It is recommended to either disable
the session timeout or extend the timeout (e.g. 24 hours / 86400 seconds) to avoid possible interruptions
during audio calls. If disabled it will avoid any potential interruptions altogether, but enabling session timeout
can help to re-validate client credentials periodically to ensure that the client is using valid credentials."
Cisco's "Configuration Notes: Cisco WLC Infrastructure in Ascom VoWiFi System" is found here:
http://www.ascomwireless.com/pdf/guide/vowifi/cisco_wlc_infrastructure_cn_92433gb.pdf
"Session Timeout for the current WLAN profile must be disabled to avoid reoccurring deauthentications."

Wireless Encryption

Over the years, wireless has become more established in the enterprise. This has led to various standards being
created around wireless security. The Ava 500 is designed to work with as many of these encryption types as
possible, including:
Open Network
– No encryption. Usually used for guest access or in situations when an upper layer will be
handing encryption, like a VPN or a protocol that supports encryption natively.
WPA (Wi-Fi Protected Access)
(Wired Equivalent Privacy). WEP is insufficiently secure and therefore is not supported. WPA uses a 256-bit
key and the Temporal Key Integrity Protocol (TKIP) to significantly increase the level of encryption over
previous standards.
WPA-2 (Wi-Fi Protected Access II)
algorithms and CCMP to replace TKIP. WPA-2 is currently the most secure industry standard to encrypt data.
Version 1.2 – 012415
– WPA is the replacement for an older security method known as WEP
– WPA-2 increases the security over WPA by introducing AES
Page 20
iRobot Proprietary
Data Communications and Security

Advertisement

Table of Contents
loading

Table of Contents