Intel 3945ABG Network Card User Manual


 
The second generation of WPA that complies with the IEEE TGi specification is known as
WPA2.
Enterprise Mode: Enterprise Mode verifies network users through a RADIUS or other
authentication server. WPA utilizes 128-bit encryption keys and dynamic session keys to
ensure your wireless network's privacy and enterprise security. Enterprise Mode is targeted
to corporate or government environments.
Personal Mode: Personal Mode requires manual configuration of a pre-shared key (PSK) on
the access point and clients. PSK authenticates users via a password, or identifying code, on
both the client station and the access point. No authentication server is needed. Personal
Mode is targeted to home and small business environments.
WPA-Enterprise and WPA2-Enterprise: Provide this level of security on enterprise
networks with an 802.1x RADIUS server. An authentication type is selected to match the
authentication protocol of the 802.1x server.
WPA-Personal and WPA2-Personal: Provide this level of security in the small network or
home environment. It uses a password also called a pre-shared key (PSK). The longer the
password, the stronger the security of the wireless network. If your wireless access point or
router supports WPA-Personal and WPA2-Personal then you should enable it on the access
point and provide a long, strong password. The same password entered into access point
needs to be used on this computer and all other wireless devices that access the wireless
network.
NOTE: WPA-Personal and WPA2-Personal are not interoperable.
AES-CCMP - (Advanced Encryption Standard - Counter CBC-MAC Protocol) It is the new
method for privacy protection of wireless transmissions specified in the IEEE 802.11i
standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-CCMP
as the data encryption method whenever strong data protection is important.
NOTE: Some security solutions may not be supported by your computer’s
operating system and may require additional software or hardware as well as
wireless LAN infrastructure support. Check with your computer manufacturer for
details.
TKIP (Temporal Key Integrity Protocol) is an enhancement to WEP (Wired Equivalent
Privacy) security. TKIP provides per-packet key mixing, a message integrity check and a
rekeying mechanism, which fixes the flaws of WEP.
MD5