User's Manual
Security Overview
Back to Contents
Security Overview: Intel(R) PRO/Wireless
2915ABG Network Connection User Guide
● WEP encryption
● 802.1x Authentication
● WPA/WPA2
● Cisco Features
WEP encryption
Using the IEEE 802.11 Wired Equivalent Privacy (WEP) encryption can prevent unauthorized reception of
wireless data. WEP encryption provides two levels of security, using a 64-bit key (sometimes referred to as 40-
bit) or a 128-bit key (also known as 104-bit). For better security, use a 128-bit key. If you use encryption, all
wireless devices on your wireless network must use the same encryption keys.
Wired Equivalent Privacy (WEP) encryption and shared authentication provides protection for your data on the
network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same
encryption key can access the network or decrypt the encrypted data transmitted by other computers.
Authentication provides an additional validation process from the adapter to the access point.
The WEP encryption algorithm is vulnerable to passive and active network attacks. TKIP and CKIP algorithms
include enhancements to the WEP protocol that mitigate existing network attacks and address its shortcomings
Open and Shared Key authentication
802.11 supports two types of network authentication methods; Open System and Shared Key.
● Using Open authentication, any wireless station can request authentication. The station that needs to
authenticate with another wireless station sends an authentication management frame that contains the
identity of the sending station. The receiving station or AP grants any request for authentication. Open
authentication allows any device network access. If no encryption is enabled on the network, any device
that knows the SSID of the access point can gain access to the network.
● Using Shared Key authentication, each wireless station is assumed to have received a secret shared
key over a secure channel that is independent from the 802.11 wireless network communications
file:///C|/CX2%20Muroc%20UG/6-15-04/security.htm (1 of 6) [6/15/2004 3:40:11 PM]