Wistron Corporation MS2140BG Manual De Usuario

Descargar
Página de 84
 
Security and Encryption: Intel(R) 
PRO/Wireless 2200BG User's Guide
Security and Encryption
Setting up Data Encryption and Authentication
Wired Equivalent Privacy (WEP) encryption and shared authentication helps provide 
protection for your data on the network. WEP uses an encryption key to encrypt data 
before transmitting it. Only computers using the same encryption key can access the 
network or decrypt the encrypted data transmitted by other computers. Authentication 
provides an additional validation process from the adapter to the access point.  The WEP 
encryption algorithm is vulnerable to passive and active network attacks. TKIP and CKIP 
algorithms include enhancements to the WEP protocol that mitigate existing network 
attacks and address its shortcomings 
Open and Shared Key authentication
802.11 support two types of network authentication methods; Open System and Shared 
Key. Supported authentication schemes are Open and Shared-Key authentication: