EasyManuals Logo

Ruijie RG-WLAN Series User Manual

Ruijie RG-WLAN Series
1243 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #61 background imageLoading...
Page #61 background image
Configuration Guide Configuring RSNA
1 Configuring RSNA
1.1 Overview
The Robust Security Network Architecture (RSNA) function provides security mechanisms for WLANs.
A WLAN uses open media and public electromagnetic waves as a carrier to transmit data signals. Neither communication
party is connected with a cable. If transmission links are not properly protected through encryption, data transmission will be
at great risk. <Therefore, security mechanisms are especially important in a WLAN.
To enhance the security, a WLAN should be provided with at least the authentication and encryption mechanisms:
Authentication mechanism: The authentication mechanism is used to authenticate users and allow only specified users
(authorized users) to use network resources.
Encryption mechanism: The encryption mechanism is used to encrypt data on wireless links to ensure that WLAN data
can be received and understood only by expected users.
Protocols and Standards
IEEE Standard for Information technology Telecommunications and information exchange between systems Local
and metropolitan area networks Specific requirements -2007
WI-FI Protected Access Enhanced Security Implementation Based On IEEE P802.11i Standard -Aug 2004
Information technology Telecommunications and information exchange between systemsLocal and metropolitan
area networksSpecific requirements 802.11, 1999 IEEE Standard for Local and metropolitan area
networks ”Port-Based Network Access Control” 802.1X™ -2004
802.11i IEEE Standard for Information technology Telecommunications and information exchange between systems
Local and metropolitan area networks Specific requirements
1.2 Applications
Application
Description
WEP Encryption
In a small WLAN that has a lower requirement for security, static WEP encryption can
be used to protect wireless data communication.
PSK Access Authentication
For small and medium-sized enterprise networks or family users, access
authentication based on pre-shared keys can be used to enhance the security of
WLANs.
802.1X Access Authentication
For a scenario that has a higher requirement for security or unified management,
port-based network access control can be used.

Table of Contents

Other manuals for Ruijie RG-WLAN Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Ruijie RG-WLAN Series and is the answer not in the manual?

Ruijie RG-WLAN Series Specifications

General IconGeneral
BrandRuijie
ModelRG-WLAN Series
CategoryWireless Access Point
LanguageEnglish

Related product manuals