User's Manual
11N Wireless Broadband Rout er User Guide
84
the net work.WPA2 is the second generat ion of WPA
security and provides a st ronger encrypt ion m echanism
through Advanced Encryption St andard (AES) , which is
a requirem ent for som e governm ent users.
8 0 2 ,1 x a ut h e nt ica t ion
St atic WEP key is difficult t o m anage for when you
change t he key, you will have t o inform all others, and if
the key is disclosed in one of the places, the key can no
longer provide security. Besides, t here’s severe security
loophole about stat ic WEP encryption. The WEP key can
be decrypt ed after one person receives a specific
am ount of dat a via wireless intercept ing. 802,1x is
initially used for wired Ethernet authent icat ion access to
prevent illegal user s from accessing t he net work. Lat er,
it is found that 802.1x can bett er solve the w ireless
net work security problem . EAP-TLS of the 802.1x
successfully achieves t he t wo-way aut hentication
between users and netw orks, i.e. can prevent illegal
users from accessing the net w ork and can also prevent
users from accessing the illegal AP. 802.1x ut ilizes
dynam ic WEP encryption t o protect t he WEP key from
being decrypt ed. To solve the publishing problem for
digital cert ificat ion, people m ake som e changes t o TLS
aut hentication and TTLS and EAP com e int o exist , which
enable you to access t he network by using t he
traditional way of authent icat ion: usernam e and
password.