![](http://pdfasset.owneriq.net/8/10/810e2171-f297-4691-9c56-1bf093cac4f0/810e2171-f297-4691-9c56-1bf093cac4f0-bga.png)
202-10078-01
x Contents
What are the Key Features of WPA Security? ...................................................... B-12
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-14
WPA Data Encryption Key Management ........................................................ B-16
Is WPA Perfect? .................................................................................................... B-18
Product Support for WPA ...................................................................................... B-18
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged ...... B-18
Changes to Wireless Access Points ............................................................... B-19
Changes to Wireless Network Adapters ......................................................... B-19
Changes to Wireless Client Programs ............................................................ B-20
Appendix C
Command Line Reference
Command Sets .............................................................................................................. C-1
Glossary