Advantek Networks AWN-PCI-54R Manuel d'utilisateur Page 35

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 35
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 34
35
used generically to refer to the entire suite of related protocols.
Transmit/ Receive
The wireless throughput in Bytes per second averaged over two seconds.
Wide Area Network (WAN)
A WAN consists of multiple LANs that are tied together via telephone services and/or fiber
optic cabling. WANs may span a city, a state, a country, or even the world.
WPA/WPA2
Wi-Fi Protected Access (WPA/WPA2) is a security enhancement that strongly increases the
level of data protection and access control to a wireless network. WPA enforces 802.1x
authentication and key-exchange and only works with dynamic encryption keys. To strengthen
data encryption, WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides
important data encryption enhancements that include a per-packet key mixing function, a
message integrity check (MIC) named Michael an extended initialization vector (IV) with
sequencing rules, and a also re-keying mechanism. Using these improvement enhancements,
TKIP protects against WEP's known weaknesses.
The second generation of WPA that complies with the IEEE TGi specification is known as
WPA2.
WPA/WPA2 Enterprise provides this level of security on enterprise networks with a 802.1x
RADIUS server. An Authentication Type is selected to match the authentication protocol of the
802.1x server.
WPA/WPA2 - Personal provides this level of security in the small network or home
environment. It uses a password also called a pre-shared key (PSK). The longer this password
the stronger the security of the wireless network. If your Wireless Access Point or Router
supports WPA/WPA2 Personal (WPA-PSK) then you should enable it on the access point and
provide a long, strong password. The same password entered into access point needs to be
used on this computer and all other wireless devices that access the wireless network.
Vue de la page 34
1 2 ... 30 31 32 33 34 35

Commentaires sur ces manuels

Pas de commentaire