User's Manual
● IPSEC
● TKIP
● Virtual Private Networks
Authentication Types
The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an
extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication
protocols.
Encryption Keys
To protect client traffic, the 802.11 standard defines Wireless Encryption Privacy (WEP) with fixed encryption
keys (and three optional key lengths). The use of fixed keys has made it easy to mount several types of attack
against WEP.
WEP Encryption
You can prevent unauthorized reception of your wireless data using the IEEE 802.11 Wired Equivalent Privacy
(WEP). The standard includes two levels of security, using a 64-bit key (sometimes referred to as 40-bit) or a
128-bit key. For better security, use a 128-bit key. If you use encryption, all wireless devices on your WLAN
must use the same encryption settings.
Refer to
Setting up WEP Encryption for more information.
802.1x
A WAN client initiates an authorization request to the access point, which authenticates the client to an
Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate
either the user (via passwords) or the machine (by MAC address).
IPSEC
Software based IPSEC transport security.
TKIP (Temporal key Integrity Protocol)
Uses an encryption method called fast-packet rekeying, that changes the encryption keys frequency.
Virtual Private Networks (VPN)
The following VPN client software is supported by PROSet. Refer to
Virtual Private Network (VPN) for more
information.
● Netstructure VPN (SST)