Intel 3945ABG Network Card User Manual


 
WPA Wi-Fi Protected Access (WPA) is a security enhancement that strongly
increases the level of data protection and access control to a wireless
network. WPA is an interim standard that will be replaced with the IEEE’s
802.11i standard upon its completion. WPA consists of RC4 and TKIP and
provides support for BSS (Infrastructure) mode only. (Not compatible with
WPA2.)
WPA2 Wi-Fi Protected Access 2 (WPA2). This is the second generation of WPA
that complies with the IEEE TGi specification. WPA2 consists of AES
encryption, pre-authentication and PMKID caching. It provides support for
BSS (Infrastructure) mode and IBSS (Ad hoc) mode. (Not compatible with
WPA.)
WPA-
Enterprise
Wi-Fi Protected Access-Enterprise applies to corporate users. A new
standards-based, interoperable security technology for wireless LAN
(subset of IEEE 802.11i draft standard) that encrypts data sent over radio
waves. WPA is a Wi-Fi standard that was designed to improve upon the
security features of WEP as follows:
Improved data encryption through the temporal key integrity
protocol (TKIP). TKIP scrambles the keys using a hashing algorithm
and, by adding an integrity-checking feature, ensures that the keys
have not been tampered with.
User authentication, which is generally missing in WEP, through the
extensible authentication protocol (EAP). WEP regulates access to a
wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP
is built on a more secure public-key encryption system to ensure
that only authorized network users can access the network.
WPA is an interim standard that will be replaced with the IEEE’s 802.11i
standard upon its completion.
WPA-Personal Wi-Fi Protected Access-Personal provides a level of security in the small
network or home environment.
WPA-PSK Wi-Fi Protected Access-Pre-Shared Key (WPA-PSK) mode does not use an
authentication server. It can be used with the data encryption types WEP
or TKIP. WPA-PSK requires configuration of a pre-shared key (PSK). You
must enter a pass phrase or 64 hex characters for a Pre-Shared Key of
length 256-bits. The data encryption key is derived from the PSK.
Back to Top
Back to Contents
Trademarks and Disclaimers