Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

3-47
Wireless Local Area Networks (WLANs)
Configuring a WLAN
Figure 3-29. No Need to Configure WEP Keys when the WLAN uses 802.1X
Configuring WPA/WPA2 Encryption. WPA and WPA 2 are similar stan-
dards, both of which provide more robust encryption than WEP and rely on
802.1X authentication. Both standards provide sets of automatically generated
per-session keys; however, WPA uses TKIP to do so and WPA2 uses CCMP
with AES encryption.
To configure WPA/WPA2, you must select which of these protocols should be
used: TKIP, AES, or both. AES is the most secure form of encryption and the
one specified by WPA2 and 802.11i. However, not all stations support such
encryption.