User's Manual

Security Overview
protection and access control to a wireless network. WPA enforces 802.1x authentication and key-exchange
and only works with dynamic encryption keys. To strengthen data encryption, WPA utilizes its Temporal Key
Integrity Protocol (TKIP). TKIP provides important data encryption enhancements that include a per-packet key
mixing function, a message integrity check (MIC) named Michael an extended initialization vector (IV) with
sequencing rules, and a also re-keying mechanism. Using these improvement enhancements, TKIP protects
against WEP's known weaknesses.
The second generation of WPA that complies with the IEEE TGi specification is known as WPA2.
WPA/WPA2 – Enterprise provides this level of security on enterprise networks with a 802.1x RADIUS server.
An Authentication Type is selected to match the authentication protocol of the 802.1x server.
WPA/WPA2 - Personal provides this level of security in the small network or home environment. It uses a
password also called a pre-shared key (PSK). The longer this password the stronger the security of the
wireless network. If your Wireless Access Point or Router supports WPA/WPA2 Personal (WPA-PSK) then you
should enable it on the access point and provide a long, strong password. The same password entered into
access point needs to be used on this computer and all other wireless devices that access the wireless
network.
Cisco Features
Cisco LEAP
Cisco LEAP (Cisco Light EAP) is a server and client 802.1x authentication via a user-supplied logon password.
When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access
Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between
client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help
protect the privacy of transmitted data.
Fast Roaming (CCKM)
When a wireless LAN is configured for fast reconnection, a LEAP enabled client device can roam from one
access point to another without involving the main server. Using Cisco Centralized Key Management (CCKM),
an access point configured to provide Wireless Domain Services (WDS) takes the place of the RADIUS server
and authenticates the client without perceptible delay in voice or other time-sensitive applications.
CKIP
Cisco Key Integrity Protocol (CKIP) is Cisco proprietary security protocol for encryption in 802.11 media. CKIP
uses the following features to improve 802.11 security in infrastructure mode:
Key Permutation (KP)
file:///C|/CX2%20Muroc%20UG/6-15-04/security.htm (4 of 6) [6/15/2004 3:40:11 PM]