SMC Networks SMC2586W-G Network Card User Manual


 
As illustrated in Fig. 46 when AP 1 and AP 2 are using the “This AP Only”
option, AP1 blocks wireless traffic between STA 1 and STA 2, while wireless
traffic between STA 2 and STA 3, which are associated with different APs, is
still allowed. If the “All APs in This Subnet” option is used as shown in Fig. 47,
AP 1 and AP 2 communicates with each other via an inter-AP protocol to
share their STA association information to block wireless traffic among all
the STAs.
There are up to 7 security modes:
Open System. No authentication, no data encryption.
•Static WEP. WEP (Wired Equivalent Privacy) keys must be manually configured.
Static TKIP (WPA-PSK). Only TKIP (Temporal Key Integrity Protocol)
mechanism of WPA (Wi-Fi Protected Access) is enabled. In this mode, you
have to specify the Pre-shared key, which will be used by the TKIP engine
as a master key to generate keys that actually encrypt outgoing packets
and decrypt incoming packets.
NOTE: The number of characters of the Pre-shared key setting must be at
leastbe-tween 8 and can be up to 63.
IEEE 802.1x EAP without Encryption (EAP-MD5). The IEEE 802.1x
functionality is enabled and the user-name/password-based EAP-MD5
authentication is used. No data encryption.
IEEE 802.1x EAP with Static WEP (EAP-MD5). The IEEE 802.1x
functionality is enabled and the user-name/password-based EAP-MD5
authentication is used. Data encryption is achieved by static WEP.
IEEE 802.1x EAP with Dynamic WEP (EAP-TLS, EAP-TTLS, PEAP). The
IEEE 802.1x functionality is enabled and dynamic WEP key distribution
authentication (EAP-TLS, EAP-TTLS, or PEAP) is used. Data encryption is
achieved by dynamic WEP.
IEEE 802.1x EAP with Dynamic TKIP (WPA). This is a full WPA mode, in
which both the TKIP and IEEE 802.1x dynamic key exchange mechanisms
are enabled. The SMC2586W-G is highly secured in this mode.
In the above security modes, a back-end RADIUS (Remote Authentication
Dial-In User Service) server is needed if IEEE 802.1x functionality is enabled.
See Section 3.5.3 for more information about IEEE 802.1x and RADIUS.
According to the IEEE 802.11 standard, WEP can be used for authentication
and data en-cryption. Normally, Shared Key authentication is used if WEP
data encryption is enabled. In rare cases, Open System authentication may
be used when WEP data encryption is enabled. The Authentication algorithm
setting is provided for better compatibility with wireless client computers
40