Aes-ccmp, Is recommended, Enterprise mode – Intel 3945ABG User Manual

Page 136: Personal mode, Wpa-enterprise and wpa2-enterprise, Wpa-personal and wpa2-personal, Tkip

Advertising
background image

The second generation of WPA that complies with the IEEE TGi specification is known as

WPA2.

Enterprise Mode: Enterprise Mode verifies network users through a RADIUS or other

authentication server. WPA utilizes 128-bit encryption keys and dynamic session keys to

ensure your wireless network's privacy and enterprise security. Enterprise Mode is targeted

to corporate or government environments.

Personal Mode: Personal Mode requires manual configuration of a pre-shared key (PSK) on

the access point and clients. PSK authenticates users via a password, or identifying code, on

both the client station and the access point. No authentication server is needed. Personal

Mode is targeted to home and small business environments.

WPA-Enterprise and WPA2-Enterprise: Provide this level of security on enterprise

networks with an 802.1x RADIUS server. An authentication type is selected to match the

authentication protocol of the 802.1x server.

WPA-Personal and WPA2-Personal: Provide this level of security in the small network or

home environment. It uses a password also called a pre-shared key (PSK). The longer the

password, the stronger the security of the wireless network. If your wireless access point or

router supports WPA-Personal and WPA2-Personal then you should enable it on the access

point and provide a long, strong password. The same password entered into access point

needs to be used on this computer and all other wireless devices that access the wireless

network.

NOTE: WPA-Personal and WPA2-Personal are not interoperable.

AES-CCMP - (Advanced Encryption Standard - Counter CBC-MAC Protocol) It is the new

method for privacy protection of wireless transmissions specified in the IEEE 802.11i

standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-CCMP

as the data encryption method whenever strong data protection is important.

NOTE: Some security solutions may not be supported by your computer’s

operating system and may require additional software or hardware as well as

wireless LAN infrastructure support. Check with your computer manufacturer for

details.

TKIP (Temporal Key Integrity Protocol) is an enhancement to WEP (Wired Equivalent

Privacy) security. TKIP provides per-packet key mixing, a message integrity check and a

rekeying mechanism, which fixes the flaws of WEP.

MD5

Advertising