4 keyguard encryption, Keyguard encryption -10, Keyguard encryption – Motorola AP-51XX User Manual

Page 26: Wi-fi protected access (wpa) using tkip encryption

Advertising
background image

AP-51xx Access Point Product Reference Guide

1-10

algorithm, but cannot interpret the encrypted data without the appropriate key. Only the sender and
receiver of the transmitted data know the key.

Wired Equivalent Privacy (WEP) is an encryption security protocol specified in the IEEE Wireless
Fidelity (Wi-Fi) standard, 802.11b and supported by the AP. WEP encryption is designed to provide a
WLAN with a level of security and privacy comparable to that of a wired LAN. The level of protection
provided by WEP encryption is determined by the encryption key length and algorithm. An encryption
key is a string of case sensitive characters used to encrypt and decrypt data packets transmitted
between a mobile unit (MU) and the access point. An access point and its associated wireless clients
must use the same encryption key (typically 1 through 4) to interoperate.

For detailed information on WEP, see

Configuring WEP Encryption on page 6-16

.

1.2.8.4 KeyGuard Encryption

Use KeyGuard to shield the master encryption keys from being discovered through hacking. KeyGuard
negotiation takes place between the access point and MU upon association. The access point can
use KeyGuard with Motorola MUs. KeyGuard is only supported on Motorola MUs making it a
Motorola proprietary security mechanism.

For detailed information on KeyGuard configurations, see

Configuring KeyGuard Encryption on page

6-18

.

1.2.8.5 Wi-Fi Protected Access (WPA) Using TKIP Encryption

Wi-Fi Protected Access (WPA) is a security standard for systems operating with a Wi-Fi wireless
connection. WEP’s lack of user authentication mechanisms is addressed by WPA. Compared to WEP,
WPA provides superior data encryption and user authentication.

WPA addresses the weaknesses of WEP by including:

a per-packet key mixing function

a message integrity check

an extended initialization vector with sequencing rules

a re-keying mechanism

WPA uses an encryption method called Temporal Key Integrity Protocol (TKIP). WPA employs 802.1X
and Extensible Authentication Protocol (EAP).

For detailed information on WPA using TKIP configurations, see

Configuring WPA/WPA2 Using TKIP

on page 6-21

.

Advertising