July 2004 202-10036-01
x Contents
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i? ........................................................ D-10
What are the Key Features of WPA Security? ...................................................... D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. D-12
WPA Data Encryption Key Management ........................................................ D-14
Is WPA Perfect? .................................................................................................... D-16
Product Support for WPA ...................................................................................... D-16
Supporting a Mixture of WPA and WEP Wireless Clients ............................... D-16
Changes to Wireless Access Points ............................................................... D-16
Changes to Wireless Network Adapters ......................................................... D-17
Changes to Wireless Client Programs ............................................................ D-18
Glossary
List of Glossary Terms ...................................................................................................G-1
Index