D-Link CP310 User Guide - Page 180
Security, Protocol, Description, Using RADIUS Authentication.
UPC - 790069289293
View all D-Link CP310 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 180 highlights
Wireless Security Protocols Security Protocol WPA: RADIUS authentication, encryption WPA-PSK: password authentication, encryption WPA2 (802.11i) Description The WPA (Wi-Fi Protected Access) security method uses MIC (message integrity check) to ensure the integrity of messages, and TKIP (Temporal Key Integrity Protocol) to enhance data encryption. Furthermore, WPA includes 802.1x and EAP authentication, based on a central RADIUS authentication server. This method is recommended for situations where you want to authenticate wireless stations using a RADIUS server, and to encrypt the transmitted data. Note: To use this security method, you must first configure a RADIUS server which supports 802.1x. See Using RADIUS Authentication. on page 368 The WPA-PSK security method is a variation of WPA that does not require an authentication server. WPA-PSK periodically changes and authenticates encryption keys. This is called rekeying. This option is recommended for small networks, which want to authenticate and encrypt wireless data, but do not want to install a RADIUS server. Note: The appliance and the wireless stations must be configured with the same passphrase. The WPA2 security method uses the more secure Advanced Encryption Standard (AES) cipher, instead of the RC4 cipher used by WPA and WEP. When using WPA or WPA-PSK security methods, the NetDefend enables you to restrict access to the WLAN network to wireless stations that support the WPA2 security method. If this setting is not selected, the NetDefend firewall allows clients to connect using both WPA and WPA2. 164 D-Link NetDefend firewall User Guide