User's Guide

Table Of Contents
4. Select the Monitor Privacy Settings option to enable this feature.
Provide the following additional configuration information:
Field Description
Extended 802.11 Authentication
WPA
Select to activate Wi-Fi Protected Access, which uses improved
data encryption through the temporal key integrity protocol
(TKIP). TKIP scrambles the keys using a hashing algorithm and,
by adding an integrity-checking feature, ensures that the keys
haven't been tampered with.
WPA2
Short for Wi-Fi Protected Access 2, this checkbox enables the
follow on security method to WPA for wireless networks that
provide stronger data protection and network access control. It
provides enterprise and consumer Wi-Fi users with a high level
of assurance that only authorized users can access their wireless
networks. Based on the IEEE 802.11i standard, WPA2 provides
government grade security by implementing the National
Institute of Standards and Technology (NIST) FIPS 140-2
compliant AES encryption algorithm and 802.1x-based
authentication.
Symbol KeyGuard
When this checkbox is selected, it activates Symbol KeyGuard
authentication protocols, which is provided by Symbol
Technologies.
802.11 Encryption
AES (CCMP)
When selected, causes the BSS to advertise support for
Advanced Encryption Standard (AES-CCMP).
Unencrypted Allowed
Select this checkbox to allow unencrypted wireless trac.
TKIP
When selected, this enables the BSS to advertise support for
Temporal Key Integrity Protocol (TKIP).
Add a Security Profile Configuration
184 Extreme AirDefense User Guide for version 10.5.