User's Manual
Table Of Contents
- Chapter 1 Introduction
- Chapter 2 Network Configuration
- Chapter 3 Hardware Installation
- Chapter 4 Initial Configuration
- Chapter 5 System Configuration
- Chapter 6 Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- SNMP Commands
- Flash/File Commands
- RADIUS Client
- 802.1x Port Authentication
- Filtering Commands
- Interface Commands
- interface
- dns server
- ip address
- ip dhcp
- shutdown
- speed-duplex
- show interface ethernet
- radio-mode
- select-antenna-mode
- description
- ssid-broadcast
- closed-system
- speed
- channel
- ssid
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- authentication
- encryption
- key
- transmit-key
- transmit-power
- max-association
- multicast-cipher
- wpa-clients
- wpa-mode
- wpa-preshared-key
- wpa-psk-type
- shutdown
- show interface wireless
- show station
- IAPP Commands
- VLAN Commands
- Appendix A Troubleshooting
- Appendix B Specifications
- Appendix C Cables and Pinouts
- Glossary
- Index
Radio Interface
5-51
Wi-Fi Protected Access (WPA)
WPA employs a combination of several technologies to provide
an enhanced security solution for 802.11 wireless networks.
The SMC2552W-G supports the following WPA components and
features:
IEEE 802.1x and the Extensible Authentication Protocol
(EAP):
WPA employs 802.1x as its basic framework for user
authentication and dynamic key management. The 802.1x client
and RADIUS server should use an appropriate EAP type—such
as EAP-TLS (Transport Layer Security), EAP-TTLS (Tunneled
TLS), or PEAP (Protected EAP)—for strongest authentication.
Working together, these protocols provide “mutual authentication”
between a client, the access point, and a RADIUS server that
prevents users from accidentally joining a rogue network. Only
when a RADIUS server has authenticated a user’s credentials will
encryption keys be sent to the access point and client.










