User's Manual

TKIP
CKIP
Authentication Types
TLS
TTLS
PEAP
LEAP
EAP-SIM
EAP-FAST
EAP-AKA
Authentication Protocols
PAP
CHAP
MS-CHAP
MS-CHAP-V2
GTC
TLS
Cisco Features
Cisco LEAP
Cisco Rogue Access Point Security Feature
802.11b and 802.11g Mixed Environment Protection Protocol
CKIP
Fast Roaming (CCKM)
Radio Management
Protecting Your WiFi Network
Your wireless network, if left unprotected, is vulnerable to access from other computers. You
can easily protect your home and small business network from nearly all forms of
unauthorized access with the security methods described in this section.
Authentication
Authentication is the process of identifying and approving a request from a client (usually a