EasyManua.ls Logo

Askey TCG310 - Page 26

Askey TCG310
71 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Page26/71
802.11x Authentication introduction
If you enable the 802.11x authentication function, you will have to offer the following
information-
z WPA (Wi-Fi Protected Access)/WPA2:
It must be used in conjunction with an authentication server such as RADIUS to
provide centralized access control and management. It can provide stronger
encryption and authentication solution than none WPA modes. WPA2 is the second
generation of WPA security.
z WPA/WPA2 Encryption:
There are two types that you can choose, AES, TKIP+AES.
TKIP takes the original master key only as a starting point and derives its
encryption keys mathematically from this mater key. Then it regularly changes
and rotates the encryption keys so that the same encryption key will never be
used twice
AES provides security between client workstations operating in ad hoc mode. It
uses a mathematical ciphering algorithm that employs variable key sizes of 128,
192 or 256 bits.

Table of Contents

Related product manuals