User's Manual

weak security feature. To connect to a stealth access point, a user must
specifically know the SSID and configure their DMU accordingly. The
feature is not a part of the 802.11 specification, and is known by differing
names by various vendors: closed mode, private network, SSID
broadcasting.
TKIP (Temporal Key
Integrity Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi
Protected Access* uses its TKIP. TKIP provides important data
encryption enhancements including a re-keying method. TKIP is part of
the IEEE 802.11i encryption standard for wireless networks. TKIP is the
next generation of WEP, the Wired Equivalency Protocol, which is used
to secure 802.11 wireless networks. TKIP provides per packet key
mixing, a message integrity check and a re-keying mechanism, thus
fixing the flaws of WEP.
TLS (Transport Layer
Security)
A type of authentication method using the Extensible Authentication
Protocol (EAP) and a security protocol called the Transport Layer
Security (TLS). EAP-TLS uses certificates which use passwords. EAP-
TLS authentication supports dynamic WEP key management. The TLS
protocol is intended to secure and authenticate communications across a
public network through data encryption. The TLS Handshake Protocol
allows the server and client to provide mutual authentication and to
negotiate an encryption algorithm and cryptographic keys before data is
transmitted.
TTLS (Tunneled
Transport Layer
Security)
These settings define the protocol and the credentials used to authenticate
a user. In TTLS, the client uses EAP-TLS to validate the server and
create a TLS-encrypted channel between the client and server. The client
can use another authentication protocol. Typically password-based
protocols challenge over this encrypted channel to enable server
validation. The challenge and response packets are sent over a non-
exposed TLS encrypted channel. TTLS implementations today support
all methods defined by EAP, as well as several older methods (CHAP,
PAP, MS-CHAP and MS-CHAP-V2). TTLS can easily be extended to
work with new protocols by defining new attributes to support new
protocols.
WEP (Wired
Equivalent Privacy)
Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred
to as 40-bit). This is a low-level encryption technique designed to give
the user about the same amount of privacy that he would expect from a
LAN. WEP is a security protocol for wireless local area networks
(WLANs) defined in the 802.11b standard. WEP is designed to provide
the same level of security as that of a wired LAN. WEP aims to provide
security by data over radio waves so that it is protected as it is transmitted
from one end point to another.
WEP Key
Either a pass phrase or hexadecimal key.
The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII
characters for 128-bit WEP. For pass phrases, 0-9, a-z, A-Z, and
~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all valid characters.