User's Manual
WPA2 Wi-Fi Protected Access 2 (WPA2). This is the second
generation of WPA that complies with the IEEE TGi
specification. WPA2 consists of AES encryption, pre-
authentication and PMKID caching. It provides support for
BSS (Infrastructure) mode and IBSS (Ad hoc) mode. (Not
compatible with WPA.)
WPA-
Enterprise
Wi-Fi Protected Access-Enterprise applies to corporate users.
A new standards-based, interoperable security technology for
wireless LAN (subset of IEEE 802.11i draft standard) that
encrypts data sent over radio waves. WPA is a Wi-Fi
standard that was designed to improve upon the security
features of WEP as follows:
● Improved data encryption through the temporal key
integrity protocol (TKIP). TKIP scrambles the keys using
a hashing algorithm and, by adding an integrity-
checking feature, ensures that the keys have not been
tampered with.
● User authentication, which is generally missing in WEP,
through the extensible authentication protocol (EAP).
WEP regulates access to a wireless network based on a
computer’s hardware-specific MAC address, which is
relatively simple to be sniffed out and stolen. EAP is
built on a more secure public-key encryption system to
ensure that only authorized network users can access
the network.
WPA is an interim standard that will be replaced with the
IEEE’s 802.11i standard upon its completion.
WPA-Personal Wi-Fi Protected Access-Personal provides a level of security
in the small network or home environment.
WPA-PSK Wi-Fi Protected Access-Pre-Shared Key (WPA-PSK) mode
does not use an authentication server. It can be used with
the data encryption types WEP or TKIP. WPA-PSK requires
configuration of a pre-shared key (PSK). You must enter a
pass phrase or 64 hex characters for a Pre-Shared Key of
length 256-bits. The data encryption key is derived from the
PSK.