Advanced Wireless Communications MINI PRO Uživatelská příručka Strana 283

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 285
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 282
stealth A stealth access point is one that has the capability and is configured to
not broadcast its SSID. This is the WiFi network name that appears when a
DMU (Device Management Utility, such as Intel® PROSet/Wireless WiFi )
scans for available wireless networks. Although this can enhance wireless
network security, it is commonly considered a weak security feature. To
connect to a stealth access point, a user must specifically know the SSID
and configure their DMU accordingly. The feature is not a part of the
802.11 specification, and is known by differing names by various vendors:
closed mode, private network, SSID broadcasting.
TKIP
(Temporal
Key Integrity
Protocol)
Temporal Key Integrity protocol improves data encryption. Wi-Fi Protected
Access* uses its TKIP. TKIP provides important data encryption
enhancements including a re-keying method. TKIP is part of the IEEE
802.11i encryption standard for wireless networks. TKIP is the next
generation of WEP, the Wired Equivalency Protocol, which is used to secure
802.11 wireless networks. TKIP provides per packet key mixing, a
message integrity check and a re-keying mechanism, thus fixing the flaws
of WEP.
TLS
(Transport
Layer
Security)
A type of authentication method using the Extensible Authentication
Protocol (EAP) and a security protocol called the Transport Layer Security
(TLS). EAP-TLS uses certificates which use passwords. EAP-TLS
authentication supports dynamic WEP key management. The TLS protocol
is intended to secure and authenticate communications across a public
network through data encryption. The TLS Handshake Protocol allows the
server and client to provide mutual authentication and to negotiate an
encryption algorithm and cryptographic keys before data is transmitted.
TTLS
(Tunneled
Transport
Layer
Security)
These settings define the protocol and the credentials used to authenticate
a user. In TTLS, the client uses EAP-TLS to validate the server and create
a TLS-encrypted channel between the client and server. The client can use
another authentication protocol. Typically password-based protocols
challenge over this encrypted channel to enable server validation. The
challenge and response packets are sent over a non-exposed TLS
encrypted channel. TTLS implementations today support all methods
defined by EAP, as well as several older methods (CHAP, PAP, MS-CHAP
and MS-CHAP-V2). TTLS can easily be extended to work with new
protocols by defining new attributes to support new protocols.
WEP (Wired
Equivalent
Privacy)
Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to
as 40-bit). This is a low-level encryption technique designed to give the
user about the same amount of privacy that he would expect from a LAN.
WEP is a security protocol for wireless local area networks (WLANs)
defined in the 802.11b standard. WEP is designed to provide the same
level of security as that of a wired LAN. WEP aims to provide security by
data over radio waves so that it is protected as it is transmitted from one
end point to another.
Zobrazit stránku 282
1 2 ... 278 279 280 281 282 283 284 285

Komentáře k této Příručce

Žádné komentáře