Netgear WNDAP360 WNDAP360 Reference Manual - Page 38

Security Profiles, WPA and WPA-PSK TKIP, WPA & WPA2 and WPA-PSK & WPA2-PSK mixed modes

Page 38 highlights

ProSafe Dual Band Wireless-N Access Point WNDAP360 • WPA and WPA-PSK (TKIP). Wi-Fi Protected Access (WPA) data encryption provides strong data security with Temporal Key Integrity Protocol (TKIP) encryption. The very strong authentication along with dynamic per frame rekeying of WPA make it virtually impossible to compromise. WPA uses RADIUS-based 802.1x authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS on page 49. WPA-PSK uses a pre-shared key (PSK) for authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 50. • WPA2 and WPA2-PSK (AES). Wi-Fi Protected Access version 2 (WPA2) data encryption provides strong data security with Advanced Encryption Standard (AES) encryption. The very strong authentication along with dynamic per frame rekeying of WPA2 make it virtually impossible to compromise. WPA2 uses RADIUS-based 802.1x authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS on page 49. WPA2-PSK uses a pre-shared key (PSK) for authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 50. • WPA & WPA2 and WPA-PSK & WPA2-PSK mixed modes. These modes support data encryption either with both WPA and WPA2 clients or with both WPA-PSK and WPA2-PSK clients and provide the most reliable security. WPA & WPA2 uses RADIUS-based 802.1x authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS on page 49. WPA-PSK & WPA2-PSK uses a pre-shared key (PSK) for authentication; for more information, see Configure and Enable Security Profiles on page 42 and Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 50. Security Profiles Security profiles let you configure unique security settings for each SSID on each radio of the wireless access point. For each radio, the wireless access point supports up to eight security profiles (BSSIDs) that you can configure on the individual Edit Wireless Network screens that are accessible from the Edit Security Profile screen (see Configure and Enable Security Profiles on page 42). To set up a security profile, select its network authentication type, data encryption, wireless client security separation, and VLAN ID: • Network authentication The wireless access point is set by default as an open system with no authentication. Wireless Configuration and Security 38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137

Wireless Configuration and Security
38
ProSafe Dual Band Wireless-N Access Point WNDAP360
WPA and WPA-PSK (TKIP)
. Wi-Fi Protected Access (WPA) data encryption provides
strong data security with Temporal Key Integrity Protocol (TKIP) encryption. The very
strong authentication along with dynamic per frame rekeying of WPA make it virtually
impossible to compromise.
WPA uses RADIUS-based 802.1x authentication; for more information, see
Configure
and Enable Security Profiles
on page 42 and
Configure WPA with RADIUS, WPA2 with
RADIUS, and WPA & WPA2 with RADIUS
on page 49.
WPA-PSK uses a pre-shared key (PSK) for authentication; for more information, see
Configure and Enable Security Profiles
on page 42 and
Configure WPA-PSK,
WPA2-PSK, and WPA-PSK & WPA2-PSK
on page 50.
WPA2 and WPA2-PSK (AES)
. Wi-Fi Protected Access version 2 (WPA2) data encryption
provides strong data security with Advanced Encryption Standard (AES) encryption. The
very strong authentication along with dynamic per frame rekeying of WPA2 make it
virtually impossible to compromise.
WPA2 uses RADIUS-based 802.1x authentication; for more information, see
Configure
and Enable Security Profiles
on page 42 and
Configure WPA with RADIUS, WPA2 with
RADIUS, and WPA & WPA2 with RADIUS
on page 49.
WPA2-PSK uses a pre-shared key (PSK) for authentication; for more information, see
Configure and Enable Security Profiles
on page 42 and
Configure WPA-PSK,
WPA2-PSK, and WPA-PSK & WPA2-PSK
on page 50.
WPA & WPA2 and WPA-PSK & WPA2-PSK mixed modes
. These modes support data
encryption either with both WPA and WPA2 clients or with both WPA-PSK and
WPA2-PSK clients and provide the most reliable security.
WPA & WPA2 uses RADIUS-based 802.1x authentication; for more information, see
Configure and Enable Security Profiles
on page 42 and
Configure WPA with RADIUS,
WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 49.
WPA-PSK & WPA2-PSK uses a pre-shared key (PSK) for authentication; for more
information, see
Configure and Enable Security Profiles
on page 42 and
Configure
WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
on page 50.
Security Profiles
Security profiles let you configure unique security settings for each SSID on each radio of the
wireless access point. For each radio, the wireless access point supports up to eight security
profiles (BSSIDs) that you can configure on the individual Edit Wireless Network screens that
are accessible from the Edit Security Profile screen (see
Configure and Enable Security
Profiles
on page 42).
To set up a security profile, select its network authentication type, data encryption, wireless
client security separation, and VLAN ID:
Network authentication
The wireless access point is set by default as an open system with no authentication.