User's Manual

TKIP Temporal Key Integrity protocol improves data encryption.
Wi-Fi Protected Access utilizes its TKIP. TKIP provides
important data encryption enhancements including a re-
keying method. TKIP is part of the IEEE 802.11i encryption
standard for wireless LANs. TKIP is the next generation of
WEP, the Wired Equivalency Protocol, which is used to secure
802.11 wireless LANs. TKIP provides per-packet key mixing,
a message integrity check and a re-keying mechanism, thus
fixing the flaws of WEP.
TLS Transport Layer Security. A type of authentication method
using the Extensible Authentication Protocol (EAP) and a
security protocol called the Transport Layer Security (TLS).
EAP-TLS uses certificates which use passwords. EAP-TLS
authentication supports dynamic WEP key management. The
TLS protocol is intended to secure and authenticate
communications across a public network through data
encryption. The TLS Handshake Protocol allows the server
and client to provide mutual authentication and to negotiate
an encryption algorithm and cryptographic keys before data
is transmitted.
TTLS Tunneled Transport Layer Security. These settings define the
protocol and the credentials used to authenticate a user. In
TTLS, the client uses EAP-TLS to validate the server and
create a TLS-encrypted channel between the client and
server. The client can use another authentication protocol,
typically password-based protocols, such as MD5 Challenge
over this encrypted channel to enable server validation. The
challenge and response packets are sent over a non-exposed
TLS encrypted channel. TTLS implementations today support
all methods defined by EAP, as well as several older methods
(CHAP, PAP, MS-CHAP and MS-CHAPv2). TTLS can easily be
extended to work with new protocols by defining new
attributes to support new protocols.