User`s manual
P-660 Series Support Notes
147
All contents copyright © 2005 ZyXEL Communications Corporation.
7. Configure 802.1x and WPA
What is the WPA Functionality?
Configuration for Access Point
Configuration for your PC
What is WPA Functionality?
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification
draft. Key differences between WAP and WEP are user authentication and improved
data encryption WAP applies IEEE 802.1x Extensible Authentication Protocol (EAP)
to authenticate wireless clients using an external RADIUS database. You can not use
the 662's local user database for WPA authentication purpose since the local user
database uses MD5 EAP which can not to generate keys.
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP),
Message Integrity Check and IEEE 802.1x. Temporal Key Integrity Protocol uses
128-bits keys that are dynamically generated and distributed by the authentication
server. It includes a per-packet key mixing function, a Message Integrity Check (MIC)