Encryption algorithms, Tion and encryption algorithms – Psion Teklogix 9160 G2 User Manual

Page 114

Advertising
background image

Chapter 10: Configuring Security
Comparison Of Security Modes For Key Management, Authentication And Encryption Algorithms

92

Psion Teklogix 9160 G2 Wireless Gateway User Manual

That said, however, security may not be as much of a priority on some types of
networks. If you are simply providing internet and printer access, as on a guest net-
work, setting the security mode to None (Plain-text) may be the appropriate choice.
To prevent clients from accidentally discovering and connecting to your network,
you can disable the broadcast SSID so that your network name is not advertised. If
the network is sufficiently isolated from access to sensitive information, this may
offer enough protection in some situations. This level of protection is the only one
offered for guest networks, and also may be the right convenience trade-off for other
scenarios where the priority is making it as easy as possible for clients to connect.
(See “Does Prohibiting The Broadcast SSID Enhance Security?” on page 98)

Following is a brief discussion of what factors make one mode more secure than
another, a description of each mode offered, and when to use each mode.

10.1.2 Comparison Of Security Modes For Key Management,

Authentication And Encryption Algorithms

Three major factors that determine the effectiveness of a security protocol are:

How the protocol manages keys.

Presence or absence of integrated user authentication in the protocol.

Encryption algorithm or formula the protocol uses to encode/decode
the data.

Following is a list of the security modes available on the 9160 G2 Wireless Gate-
way, along with a description of the key management, authentication, and encryp-
tion algorithms used in each mode. We include some suggestions as to when one
mode might be more appropriate than another.

“When To Use Unencrypted (No Security)” on page 93.

“When To Use Static WEP” on page 93.

“When To Use IEEE 802.1x” on page 94.

“When To Use WPA Personal” on page 95.

“When To Use WPA Enterprise” on page 96.

Advertising