User Manual

Table Of Contents
xii
v0.1, December 2005
WPA and WPA2 Wireless Security .................................................................................8-8
How Does WPA Compare to WEP? .........................................................................8-9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ...............................................8-9
What are the Key Features of WPA and WPA2 Security? .......................................8-9
Is WPA/WPA2 Perfect? ..........................................................................................8-15
Product Support for WPA/WPA2 ............................................................................8-15
Appendix C
Command Line Reference
Configurable CLI and Web UI Settings Comparison ......................................................9-1
Quick View of Commands and How to Get Help ............................................................9-3
Commands and Syntax ............................................................................................9-3
Getting Help on Commands at the CLI ....................................................................9-6
Keyboard Shortcuts and Tab Completion Help ...............................................................9-8
CLI Command Sets ........................................................................................................9-9