Netgear WC7600 Reference Manual - Page 27

Manage Security Profiles and Profile Groups, System Planning and Deployment Scenarios

Page 27 highlights

ProSAFE Wireless Controller WC7600 The encryption option that you can select depends upon the authentication method that you have selected. The following table lists the authentication methods available, with their corresponding encryption options: Table 3. Authentication and encryption options Authentication Method Open System Shared Key WPA-PSK WPA2-PSK WPA-PSK and WPA2-PSK WPA WPA2 WPA and WPA2 Encryption Option Authentication Server 64-bit, 128-bit, or 152-bit WEP None 64-bit, 128-bit, or 152-bit WEP None TKIP or TKIP+AES None AES or TKIP+AES None TKIP+AES None TKIP or TKIP+AES One of the following authentication servers: • External RADIUS server • Internal authentication server • External LDAP server AES or TKIP+AES One of the following authentication servers: • External RADIUS server • Internal authentication server • External LDAP server TKIP+AES One of the following authentication servers: • External RADIUS server • Internal authentication server • External LDAP server For information about how to configure client authentication, data encryption, and authentication servers, see Chapter 6, Manage Security Profiles and Profile Groups. System Planning and Deployment Scenarios 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307

System Planning and Deployment Scenarios
27
ProSAFE Wireless Controller WC7600
The encryption option that you can select depends upon the authentication method that you
have selected. The following table lists the authentication methods available, with their
corresponding encryption options:
Table 3.
Authentication and encryption options
Authentication Method
Encryption Option
Authentication Server
Open System
64-bit, 128-bit, or 152-bit WEP
None
Shared Key
64-bit, 128-bit, or 152-bit WEP
None
WPA-PSK
TKIP or TKIP+AES
None
WPA2-PSK
AES or TKIP+AES
None
WPA-PSK and WPA2-PSK
TKIP+AES
None
WPA
TKIP or TKIP+AES
One of the following authentication servers:
External RADIUS server
Internal authentication server
External LDAP server
WPA2
AES or TKIP+AES
One of the following authentication servers:
External RADIUS server
Internal authentication server
External LDAP server
WPA and WPA2
TKIP+AES
One of the following authentication servers:
External RADIUS server
Internal authentication server
External LDAP server
For information about how to configure client authentication, data encryption, and
authentication servers, see
Chapter 6, Manage Security Profiles and Profile Groups
.