Owner's Manual

Dell ControlPoint Connection Manager 59
CKIP
—Cisco CKIP Open System Authentication does not have an
authentication function. It only identifies a wireless node using its wireless
adapter hardware address.
Advanced
802.1X
—802.1X security enforces authentication of a network node before it
can begin to exchange data with the network. This mode is for environments
with a Remote Access Dial-In User Service (RADIUS) infrastructure. This
environment requires advanced technical support to set up and maintain, and
is intended for use by larger organizations.
WPA-Enterprise/WPA2-Enterprise
—The network is operating in 802.1X
authentication mode. This mode is for environments with a Remote Access
Dial-In User Service (RADIUS) infrastructure. This environment requires
advanced technical support to set up and maintain and is intended for use by
larger organizations. The WPA-Enterprise protocol uses either WPA or
WPA2 protocols based on the WPA/WPA2 security protocols available on
the AP.
CCKM
—An authentication method in which a Cisco-branded access point
is configured to provide Cisco Wireless Domain Services (WDS) to take the
place of the RADIUS server and to authenticate the client very quickly so
that there is no perceptible delay in voice or other time-sensitive applications.
WEP - Open System Authentication
WEP - Open System Authentication does not have an authentication function. It
only identifies a wireless node using its wireless adapter hardware address.
The Data Encryption Method is
Wired Equivalent Privacy
or
WEP
.
The Authentication Method is
Open
.
Open System Authentication may use a network key for authentication.
WEP (Shared key) Authentication
WEP Shared Key authentication verifies that the wireless client joining the
wireless network has been configured with a secret key. With an infrastructure
network, all the wireless clients and the wireless APs use the same shared key.
With an ad hoc network, all the wireless clients of the ad hoc wireless network
use the same shared key.
The Data Encryption Method is
Wired Equivalent Privacy
or
WEP
.
A5_bk0.book Page 59 Wednesday, January 28, 2009 12:42 PM