Netgear WC7520 WC7520 Reference Manual - Page 87

Configuring Advanced Security Profiles for Access Point Groups, Table 23.

Page 87 highlights

ProSafe 20-AP Wireless Controller WC7520 Reference Manual Table 23. Network Authentication and Data Encryption Network Authentication Open Shared Key Legacy 802.1x WPA with RADIUS WPA2 with RADIUS WPA-PSK WPA2-PSK WPA2-PSK WPA and WPA2 WPA-PSK/WPA2-PSK Data Encryption Description None. No encryption. WEP. • 64-bit WEP encryption uses 40/64 bit encryption. • 128-bit WEP encryption uses 104/128 bit encryption. • 152-bit WEP is a proprietary mode that works only with other wireless devices that support this mode. • Select the WPA2 option only if all clients support WPA2. If this option is selected, you must use AES. • WPA/WPA2 with RADIUS allows clients to use either WPA (with TKIP) or WPA2 (with AES). If this option is selected, you must use TKIP + AES encryption. All require RADIUS configuration. TKIP or TKIP + AES and a WPA passphrase (network key). Standard encryption method for WPA2. AES and TKIP + AES . Some clients support AES with WPA, but this is not supported by this access point. TKIP + AES encryption and enter the Clients can use either WPA (with TKIP) or WPA passphrase (network key). WPA2 (with AES). TKIP + AES. Broadcast packets use TKIP. For unicast (point-to-point) transmissions, WPA clients use TKIP, and WPA2 clients use AES. Configuring Advanced Security Profiles for Access Point Groups Note: Not all networks require access point groups. See Chapter 6, Managing Access Point Groups for more information about access point groups. The Profile Groups screen lets you edit up to eight security profiles for managed access points in the selected group. The number of security profiles applied to managed access point depends on the supported profiles per access point. Separate profiles are applied to 802.11b/bg/ng and 802.11a/na mode radios. Chapter 8: Configuring Security and Wireless Security Profiles | 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Chapter 8:
Configuring Security and Wireless Security Profiles
|
87
ProSafe 20-AP Wireless Controller WC7520 Reference Manual
Configuring Advanced Security Profiles for Access Point
Groups
Note:
Not all networks require access point groups. See
Chapter 6,
Managing Access Point Groups
for more information about access
point groups.
The Profile Groups screen lets you edit up to eight security profiles for managed access
points in the selected group. The number of security profiles applied to managed access
point depends on the supported profiles per access point. Separate profiles are applied to
802.11b/bg/ng and 802.11a/na mode radios.
Table 23.
Network Authentication and Data Encryption
Network
Authentication
Data Encryption
Description
Open
None.
No encryption.
Shared Key
WEP.
• 64-bit WEP encryption uses 40/64 bit
encryption.
• 128-bit WEP encryption uses
104/128 bit encryption.
• 152-bit WEP is a proprietary mode that
works only with other wireless devices
that support this mode.
Legacy 802.1x
WPA with RADIUS
WPA2 with RADIUS
• Select the WPA2 option only if all
clients support WPA2. If this option
is selected, you must use AES.
• WPA/WPA2 with RADIUS allows
clients to use either WPA (with
TKIP) or WPA2 (with AES). If this
option is selected, you must use
TKIP + AES encryption.
All require RADIUS configuration.
WPA-PSK
WPA2-PSK
TKIP or TKIP + AES and a WPA
passphrase (network key).
Standard encryption method for WPA2.
WPA2-PSK
AES and TKIP + AES .
Some clients support AES with WPA, but this
is not supported by this access point.
WPA and WPA2
TKIP + AES encryption and enter the
WPA passphrase (network key).
Clients can use either WPA (with TKIP) or
WPA2 (with AES).
WPA-PSK/WPA2-PSK
TKIP + AES.
Broadcast packets use TKIP. For unicast
(point-to-point) transmissions, WPA clients
use TKIP, and WPA2 clients use AES.