Search – Sony SVF14A14CXB User Manual

Page 246

Advertising
background image

IEEE 802.11i specification. It utilizes the enhanced data encryption Temporal
Key Integrity Protocol (TKIP) in addition to user authentication using 802.1X
and Extensible Authentication Protocol (EAP). Data encryption protects the
vulnerable wireless link between clients and access points. Besides that, there
are other typical LAN security mechanisms to ensure privacy, such as:
password protection, end-to-end encryption, virtual private networks, and
authentication. WPA2, the second generation of WPA, provides stronger data
protection and network access control and is also designed to secure all
versions of 802.11 devices, including 802.11b, 802.11a, 802.11g, and 802.11n
standards, multi-band and multi-mode. In addition, based on the ratified IEEE
802.11i standard, WPA2 provides government grade security by implementing
the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant
AES encryption algorithm and 802.1X-based authentication. WPA2 is backward
compatible with WPA.

Go to Page Top

Related Topic

About the Wi-Fi(R) (Wireless LAN) Standards
Starting Wi-Fi(R) (Wireless LAN) Communications
Stopping Wi-Fi(R) (Wireless LAN) Communications
Notes on Using the BLUETOOTH(R) Function

Go to Page Top

© 2013 Sony Corporation

246

Search

Advertising