User's Manual

Configuration Utility Overview
Security
Copyright © 2005 Foxconn
CONFIDENTIAL
Doc. No. MV-S800245-00 Rev. C
May 26, 2005, 2.00 Document Classification: Proprietary Page 15
2.3 Security
Implementing a security infrastructure to monitor physical access to WLAN networks is more difficult than
monitoring access on wired networks. Unlike wired networks where a physical connection is required, anyone
within range of a wireless Access Point can send and receive frames, as well as listen for frames being sent.
IEEE 802.11 defines a set of standards and protocols for use in minimizing the security risks on wireless networks.
Two of these security standards are as follows:
802.1x802.1x authentication provides authenticated access to 802.11 wireless networks and to wired
Ethernet networks. 802.1x minimizes wireless network security risks by providing user and computer
identification, centralized authentication, and encryption services based on the WEP algorithm. 802.1x
supports Extensible Authentication Protocol (EAP). EAP allows the use of different authentication methods,
such as smart cards and certificates.
Wi-Fi Protected Access (WPA)WPA is an implementation based on a subset of the 802.11i standard.
WPA provides enhanced security for wireless networks when used with the TKIP and the Message Integrity
Check (MIC) algorithms.
Wi-Fi Protected Access (WPA2)The next generation of Wi-Fi security, based on the final 802.11i
standard. WPA2 offers the strongest available security in the form of AES-level encryption (Advanced
Encryption Standard), plus faster roaming between access points.
2.3.1 Security Configurations
The configuration utility supports the following security protocols:
Authentication Modes
Open System
Shared Key
Auto Switch
802.1x
WPA-PSK
WPA2-PSK
WPA
WPA2
CCX
Encryption Methods
Security Off
WEP
TKIP
AES
802.1x Authentication Protocol
EAP/TLS
EAP/PEAP
EAP/LEAP
WEP Key Size
64 bits WEP (40-bit key (5 bytes))
128 bits WEP (104-bit key (13 bytes))