User's Manual
● TKIP
● CKIP
Authentication Types
● TLS
● TTLS
● PEAP
● LEAP
● EAP-SIM
● EAP-FAST
● EAP-AKA
Authentication Protocols
● PAP
● CHAP
● MS-CHAP
● MS-CHAP-V2
● GTC
● TLS
Cisco Features
● Cisco LEAP
● Cisco Rogue Access Point Security Feature
● 802.11b and 802.11g Mixed Environment Protection Protocol
● CKIP
● Fast Roaming (CCKM)
● Radio Management
Protecting Your WiFi Network
Your wireless network, if left unprotected, is vulnerable to access from other computers. You
can easily protect your home and small business network from nearly all forms of
unauthorized access with the security methods described in this section.
Authentication
Authentication is the process of identifying and approving a request from a client (usually a