User's Manual

Wireless Networker LA-5030 PC Card & LA-5033 PCI Adapter User Guide 9
a message integrity check
an extended initialization vector with sequencing rules
a re-keying mechanism.
WPA uses an encryption method called Temporal Key Integrity Protocol
(TKIP). WPA employs 802.1X and Extensible Authentication Protocol
(EAP). Access points can operate in a combination of WEP/WPA modes
to support both WEP and WPA Windows 2000 and XP clients.
Note: For Windows XP users, if you want to use Zero Config to set
WPA, ensure Service Pack #1 and WPA Hotfix Q815485 is
installed.
2.6.1 WPA-PSK
Wi-Fi Protected Access Pre Shared Key (WPA-PSK) is a type of WPA
providing the same durable encryption protection for users without an
enterprise authentication server.With WPA-PSK, encryption keys are
automatically re-keyed and authenticated after a designated period or
after the transmission of a specified number of packets.
2.7 Draft IEEE 802.11h Compatibility--TBD
2.8 Symbol Value Add Features--TBD
(Like Load Balancing, Rogue AP detection?)