User's Manual
● The access point places the client port in the authorized state and data
traffic is allowed to proceed.
802.1x Features
● 802.1x supplicant protocol support
● Support for the Extensible Authentication Protocol (EAP) - RFC 2284
● Supported Authentication Methods:
❍ EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
❍ EAP Tunneled TLS (TTLS)
❍ PEAP
● Supports Microsoft Windows XP and Windows 2000
WPA or WPA2
Wi-Fi Protected Access (WPA or WPA2) is a security enhancement that
strongly increases the level of data protection and access control to a wireless
network. WPA enforces 802.1x authentication and key-exchange and only
works with dynamic encryption keys. To strengthen data encryption, WPA
utilizes Temporal Key Integrity Protocol (TKIP). TKIP provides important data
encryption enhancements that include a per-packet key mixing function, a
message integrity check (MIC) called Michael an extended initialization vector
(IV) with sequencing rules, and a rekeying mechanism. With these
improvement enhancements, TKIP protects against WEP's known weaknesses.
The second generation of WPA that complies with the IEEE TGi specification is
known as WPA2.
Enterprise Mode: Enterprise Mode verifies network users through a RADIUS
or other authentication server. WPA utilizes 128-bit encryption keys and
dynamic session keys to ensure your wireless network's privacy and enterprise
security. Enterprise Mode is targeted to corporate or government
environments.
Personal Mode: Personal Mode requires manual configuration of a pre-shared