User's Manual

Appendix D Wireless LANs
B222s User’s Guide
240
4 The AP and wireless client s use t he TKI P or AES encrypt ion process, the PMK and inform ation
exchanged in a handshake t o creat e t em poral encr ypt ion keys. They use t hese keys t o encrypt dat a
exchanged bet ween t hem .
Figure 167 WPA( 2) -PSK Aut hent icat ion
Security Parameters Summary
Refer t o this t able t o see what ot her secur it y param et ers you should configure for each
authent icat ion m et hod or key m anagem ent pr ot ocol t ype. MAC address filt ers are not dependent on
how you configure these security feat ures.
Antenna Overview
An ant enna couples RF signals onto air. A t ransm itt er wit hin a w ireless device sends an RF signal to
the ant enna, which propagat es the signal t hrough the air. The ant enna also operat es in reverse by
capt uring RF signals from t he air.
Positioning t he ant ennas properly increases the range and coverage area of a wireless LAN.
Table 88 Wireless Security Relat ional Mat r ix
AUTHENTICATION
METHOD/ KEY
MANAGEMENT PROTOCOL
ENCRYPTIO
N METHOD
ENTER
MANUAL KEY
IEEE 802.1X
Open None No Disable
Enable wit hout Dynam ic WEP Key
Open WEP No Enable wit h Dynam ic WEP Key
Ye s Enable wit hout Dynam ic WEP Key
Ye s Disable
Shared WEP No Enable wit h Dynam ic WEP Key
Ye s Enable wit hout Dynam ic WEP Key
Ye s Disable
WPA TKI P/ AES No Enable
WPA-PSK TKI P/ AES Ye s Disable
WPA2 TKI P/ AES No Enable
WPA2- PSK TKI P/ AES Yes Disable