Open
See
Open Authentication
.
Shared
See
Shared Authentication
.
WPA-Personal
See
WPA-Personal
.
WPA2-Personal
See
WPA2-Personal
.
WPA Enterprise
Enterprise Mode authentication is targeted to corporate or government environments. WPA Enterprise verifies
network users through a
RADIUS
or other authentication server. WPA uses 128-bit encryption keys and dynamic
session keys to ensure your wireless network's privacy and enterprise security. An authentication type is selected
to match the authentication protocol of the 802.1X server.
WPA2 Enterprise
WPA Enterprise authentication is targeted to corporate or government environments. WPA2 Enterprise verifies
network users through a
RADIUS
or other authentication server. WPA2 uses 128-bit encryption keys and dynamic
session keys to ensure your wireless network's privacy and enterprise security. An authentication type is selected
to match the authentication protocol of the 802.1X server. Enterprise Mode is targeted to corporate or government
environments. WPA2 is an improvement over WPA and implements the full IEEE 802.11i standard.
Data Encryption
AES-CCMP
Advanced Encryption Standard - Counter CBC-MAC Protocol. The new method for privacy protection of wireless
transmissions specified in the IEEE 802.11i standard. AES-CCMP provides a stronger encryption method than TKIP.
Choose AES-CCMP as the data encryption method whenever strong data protection is important. AES-CCMP is
available with WPA/WPA2 Personal/Enterprise network authentication.
NOTE
: Some security solutions may not be supported by your computer's operating system and may require
additional software or hardware as well as wireless LAN infrastructure support. Check with your computer
manufacturer for details.
TKIP
Temporal Key Integrity Protocol provides per-packet key mixing, a message integrity check, and a rekeying
mechanism. TKIP is available with WPA/WPA2 Personal/Enterprise network authentication.
CKIP
See
CKIP
.
WEP
Wired Equivalent Privacy (WEP) uses encryption to help prevent unauthorized reception of wireless data. WEP uses
an
encryption key
to encrypt data before transmitting it. Only computers that use the same encryption key can
access the network and decrypt the data transmitted by other computers. Enterprise WEP is not exactly the same
Intel® PROSet/Wireless WiFi Connection Utility User's Guide