EasyManuals Logo

EXTREME SWITCHING ISW 4-10/100P User Manual

EXTREME SWITCHING ISW 4-10/100P
167 pages
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #167 background imageLoading...
Page #167 background image
Wired Equivalent Privacy is a security protocol for WLAN (Wireless Local Area Network)s defined in the
802.11b standard. WEP aims to provide security by encrypting data over radio waves so that it is
protected as it is transmitted from one end point to another.
WLAN
Wireless Local Area Network.
WPA
Wireless Protected Access is a security solution adopted by the Wi-Fi Alliance that adds authentication
to WEP (Wired Equivalent Privacy)'s basic encryption. For authentication, WPA specifies IEEE 802.1x
authentication with Extensible Authentication Protocol (EAP). For encryption, WPA uses the TKIP
(Temporal Key Integrity Protocol) mechanism, which shares a starting key between devices, and then
changes their encryption key for every packet. CA (Certificate Authority) can also be used. Also part of
the encryption mechanism are 802.1x for dynamic key distribution and MIC (Message Integrity Check or
Code ).
WPA requires that all computers and devices have WPA software.
Glossary
ISW Series Managed Industrial Ethernet Switch Command Reference Guide 167

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the EXTREME SWITCHING ISW 4-10/100P and is the answer not in the manual?

EXTREME SWITCHING ISW 4-10/100P Specifications

General IconGeneral
BrandEXTREME SWITCHING
ModelISW 4-10/100P
CategoryNetwork Router
LanguageEnglish