Appendix D Wireless LANs
P-320W v3 User’s Guide
243
If this feature is enabled, it is not necessary to configure a default encryption key
in the Wireless screen. You may still configure and store keys here, but they will
not be used while Dynamic WEP is enabled.
Note: EAP-MD5 cannot be used with dynamic WEP key exchange
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and
PEAP) use dynamic keys for data encryption. They are often deployed in corporate
environments, but for public deployment, a simple user name and password pair
is more practical. The following table is a comparison of the features of
authentication types.
WPA(2)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2
(IEEE 802.11i) is a wireless security standard that defines stronger encryption,
authentication and key management than WPA.
Key differences between WPA(2) and WEP are improved data encryption and user
authentication.
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity
Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. In addition to
TKIP, WPA2 also uses Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP) to offer
stronger encryption.
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically
generated and distributed by the authentication server. It includes a per-packet
key mixing function, a Message Integrity Check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
Table 97
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate – Client
No
Yes
Optional
Optional
No
Certificate – Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity
Protection
No
No
Yes
Yes
No
Summary of Contents for P-320W v3
Page 2: ......
Page 8: ...Safety Warnings P 320W v3 User s Guide 8 ...
Page 10: ...Contents Overview P 320W v3 User s Guide 10 ...
Page 18: ...Table of Contents P 320W v3 User s Guide 18 ...
Page 20: ...20 ...
Page 24: ...Chapter 1 Getting to Know Your P 320W v3 P 320W v3 User s Guide 24 ...
Page 36: ...Chapter 2 Introducing the Web Configurator P 320W v3 User s Guide 36 ...
Page 54: ...54 ...
Page 72: ...Chapter 4 Wireless LAN P 320W v3 User s Guide 72 ...
Page 76: ...Chapter 5 Wireless Client Mode P 320W v3 User s Guide 76 ...
Page 88: ...Chapter 7 LAN P 320W v3 User s Guide 88 ...
Page 104: ...Chapter 10 VLAN P 320W v3 User s Guide 104 ...
Page 105: ...105 PART III Security Firewall 117 Content Filtering 125 ...
Page 106: ...106 ...
Page 116: ...Chapter 11 WAN P 320W v3 User s Guide 116 ...
Page 124: ...Chapter 12 Firewall P 320W v3 User s Guide 124 ...
Page 130: ...130 ...
Page 134: ...Chapter 14 Static Route P 320W v3 User s Guide 134 ...
Page 140: ...Chapter 15 Remote Management P 320W v3 User s Guide 140 ...
Page 154: ...Chapter 16 Universal Plug and Play UPnP P 320W v3 User s Guide 154 ...
Page 155: ...155 PART V Maintenance and Troubleshooting System 157 Logs 163 Product Specifications 193 ...
Page 156: ...156 ...
Page 178: ...Chapter 18 Logs P 320W v3 User s Guide 178 ...
Page 184: ...Chapter 19 Tools P 320W v3 User s Guide 184 ...
Page 192: ...Chapter 20 Troubleshooting P 320W v3 User s Guide 192 ...
Page 196: ...Chapter 21 Product Specifications P 320W v3 User s Guide 196 ...
Page 198: ...198 ...
Page 260: ...Index P 320W v3 User s Guide 260 ...
Page 261: ......
Page 262: ......