28.05.2013 Views

User Guide - SMC

User Guide - SMC

User Guide - SMC

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Understanding Wireless Security<br />

8<br />

Understanding<br />

Wireless Security<br />

Anyone within range of your wireless network is a potential<br />

security risk. Without wireless security options configured on your<br />

network, a person outside of your physical location, but within<br />

your wireless range may be able to access the network and any<br />

data that is being transmitted over it. <strong>SMC</strong> Networks’ wireless<br />

devices support the wireless security standard called Wired<br />

Equivalent Privacy (WEP) to prevent unauthorized users from<br />

accessing your network over a wireless connection. This security<br />

feature uses a secure network key, called a WEP key. The WEP<br />

key encrypts wireless data so that it is only readable by other<br />

computers that have the matching WEP key. The WEP key is<br />

stored on each wireless device, so that data can be encrypted<br />

and decrypted as it is transmitted over the network.<br />

While the Institute of Electrical & Electronics Engineers (IEEE)<br />

802.11i standard is being finalized, an interim solution called<br />

Wi-Fi Protected Access (WPA) has been introduced. The EZ<br />

Connect g Wireless Ethernet Bridge is the first device of its<br />

kind to support this new wireless security specification. WPA<br />

defines a set of interoperable security enhancements that greatly<br />

improve upon the level of data encryption and authentication or<br />

access control for existing and future wireless LAN systems. WPA<br />

includes Extensible Authentication Protocol (EAP), Temporal Key<br />

Integrity Protocol (TKIP) and 802.1X for authentication and<br />

dynamic key exchange. In the WPA-enabled network, the client<br />

first associates with the Access Point. The Access Point does not<br />

allow network access until the user can be successfully<br />

authenticated. If the client shows the correct credentials to the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!