User's Manual Part 2

Wireless Security Protocols
Chapter 7: Configuring a Wireless Network 165
Wireless Security Protocols
The Safe@Office wireless security appliance supports the following security
protocols:
Table 23: Wireless Security Protocols
Security
Protocol
Description
None No security method is used. This option is not recommended, because it
allows unauthorized users to access your WLAN network, although you can
still limit access from the WLAN by creating firewall rules. This method is
suitable for creating public access points.
WEP encryption In the WEP (Wired Equivalent Privacy) encryption security method, wireless
stations must use a pre-shared key to connect to your network. This method
is not recommended, due to known security flaws in the WEP protocol. It is
provided for compatibility with existing wireless deployments.
Note: The appliance and the wireless stations must be configured with the
same WEP key.
802.1X: RADIUS
authentication, no
encryption
In the 802.1x security method, wireless stations (supplicants) attempting to
connect to the access point (authenticator) must first be authenticated by a
RADIUS server (authentication server) which supports 802.1x . All messages
are passed in EAP (Extensible Authentication Protocol).
This method is recommended for situations in which you want to authenticate
wireless users, but do not need to encrypt the data.
Note: To use this security method, you must first configure a RADIUS server.
See Using RADIUS Authentication. on page 372