User's Manual

$,INK7"25SER-ANUAL
3ECTION3ECURITY
7HATIS70!
70!OR7I&I0ROTECTED!CCESSISA7I&ISTANDARDTHATWASDESIGNEDTOIMPROVETHESECURITYFEATURESOF7%07IRED
%QUIVALENT0RIVACY
4HEMAJORIMPROVEMENTSOVER7%0
s)MPROVEDDATAENCRYPTIONTHROUGHTHE4EMPORAL+EY)NTEGRITY0ROTOCOL4+)04+)0SCRAMBLESTHEKEYS
USINGAHASHINGALGORITHMANDBYADDINGANINTEGRITYCHECKINGFEATUREENSURESTHATTHEKEYSHAVENT
BEENTAMPEREDWITH70!ISBASEDONIANDUSES!DVANCED%NCRYPTION3TANDARD!%3INSTEAD
OF4+)0
s5SERAUTHENTICATIONWHICHISGENERALLYMISSINGIN7%0THROUGHTHEEXTENSIBLEAUTHENTICATIONPROTOCOL
%!07%0 REGULATES ACCESS TO A WIRELESS NETWORK BASED ON A COMPUTERS HARDWARESPECIlC-!#
ADDRESSWHICHISRELATIVELYSIMPLETOBESNIFFEDOUTANDSTOLEN%!0ISBUILTONAMORESECUREPUBLICKEY
ENCRYPTIONSYSTEMTOENSURETHATONLYAUTHORIZEDNETWORKUSERSCANACCESSTHENETWORK
70!03+70!03+USESAPASSPHRASEORKEYTOAUTHENTICATEYOURWIRELESSCONNECTION4HEKEYISANALPHANUMERIC
PASSWORDBETWEENANDCHARACTERSLONG4HEPASSWORDCANINCLUDESYMBOLS?ANDSPACES4HISKEYMUST
BETHEEXACTSAMEKEYENTEREDONYOURWIRELESSROUTERORACCESSPOINT
70!70!INCORPORATESUSERAUTHENTICATIONTHROUGHTHE%XTENSIBLE!UTHENTICATION0ROTOCOL%!0%!0ISBUILTONA
MORESECUREPUBLICKEYENCRYPTIONSYSTEMTOENSURETHATONLYAUTHORIZEDNETWORKUSERSCANACCESSTHENETWORK