H3c-technologies H3C WA2600 Series WLAN Access Points Manual do Utilizador Página 18

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 17
5-3
Wired Equivalent Privacy (WEP) was developed to protect data exchanged among authorized users in
a wireless LAN from casual eavesdropping. WEP uses RC4 encryption for confidentiality. WEP
encryption falls into static and dynamic encryption according to how a WEP key is generated.
z Static WEP encryption
With Static WEP encryption, all clients using the same SSID must use the same encryption key. If the
encryption key is deciphered or lost, attackers will get all encrypted data. In addition, periodical manual
key update brings great management workload.
z Dynamic WEP encryption
Dynamic WEP encryption is a great improvement over static WEP encryption. With dynamic WEP
encryption, WEP keys are negotiated between client and server through the 802.1X protocol so that
each client is assigned a different WEP key, which can be updated periodically to further improve
unicast frame transmission security.
Although WEP encryption increases the difficulty of network interception and session hijacking, it still
has weaknesses due to limitations of RC4 encryption algorithm and static key configuration.
3) TKIP encryption
Temporal key integrity Protocol (TKIP) and WEP both use the RC4 algorithm, but TKIP has many
advantages over WEP, and provides more secure protection for WLAN as follows:
z First, TKIP provides longer IVs to enhance encryption security. Compared with WEP encryption,
TKIP encryption uses 128–bit RC4 encryption algorithm, and increases the length of IVs from 24
bits to 48 bits.
z Second, TKIP allows for dynamic key negotiation to avoid static key configuration. TKIP replaces a
single static key with a base key generated by an authentication server. TKIP dynamic keys cannot
be easily deciphered.
z Third, TKIP offers Message Integrity Check (MIC) and countermeasures. If a packet fails the MIC,
the data may be tampered, and the system may be attacked. If two packets fail the MIC in a certain
period, the AP automatically takes countermeasures. It will not provide services in a certain period
to prevent attacks.
4) CCMP encryption
CTR with CBC-MAC protocol (CCMP) is based on the CCM of the AES encryption algorithm. CCM
combines CTR for confidentiality and CBC-MAC for authentication and integrity. CCM protects the
integrity of both the MPDU Data field and selected portions of the IEEE 802.11 MPDU header. The AES
block algorithm in CCMP uses a 128-bit key and a 128-bit block size. Similarly, CCMP contains a
dynamic key negotiation and management method, so that each wireless client can dynamically
negotiate a key suite, which can be updated periodically to further enhance the security of the CCMP
encryption mechanism. During the encryption process, CCMP uses a 48-bit packet number (PN) to
ensure that each encrypted packet uses a different PN, thus improving the security to a certain extent.
Client Access Authentication
After a wireless client sets up a wireless link with an AP, the wireless client is considered as having
accessed the wireless network. However, for the security and management of the wireless network, the
wireless client can access the network resources only after passing subsequent authentication. Among
the authentication mechanisms, preshared key (PSK) authentication and 802.1X authentication
accompany the dynamic key negotiation and management of the wireless link, and therefore, they are
closely related to wireless link negotiation. However, they are not directly related to the wireless link.
Vista de página 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 ... 83 84

Comentários a estes Manuais

Sem comentários

Baumatic BMC450SS manuali

Manuali dei proprietari e guide per l'utente per no Baumatic BMC450SS.
We fornisce 1 manuali pdf Baumatic BMC450SS per scaricare gratuitamente in base al tipo di documento: Disegni e schemi


Baumatic BMC450SS Disegni e schemi (1 pagine)


Marchio: Baumatic | Categoria: No info | Dimensione: 0.10 MB |

Indice





Più prodotti e manuali per no Baumatic

Modelli Tipo di Documento
BHG790SS Disegni e schemi Baumatic BHG790SS Technical Drawing, 1 pagine
BHI660BE Disegni e schemi   Baumatic BHI660BE Technical Drawing, 1 pagine
BHG420SS Disegni e schemi Baumatic BHG420SS Technical Drawing, 1 pagine
BDWS60SS Disegni e schemi Baumatic BDWS60SS Technical Drawing, 1 pagine
BHC900 Disegni e schemi Baumatic BHC900 Technical Drawing, 1 pagine
BDWI460 Disegni e schemi Baumatic BDWI460 Technical Drawing, 1 pagine
BCG625BL Disegni e schemi Baumatic BCG625BL Technical Drawing, 1 pagine
BHS320.5SS Disegni e schemi Baumatic BHS320.5SS Technical Drawing, 1 pagine
BHG710.5SS Disegni e schemi Baumatic BHG710.5SS Technical Drawing, 1 pagine
BO455TS Disegni e schemi Baumatic BO455TS Technical Drawing, 1 pagine
BO920TS Disegni e schemi   Baumatic BO920TS Technical Drawing, 1 pagine
BSO636SS Disegni e schemi   Baumatic BSO636SS Technical Drawing [en] , 1 pagine
BRCF1960SL Disegni e schemi Baumatic BRCF1960SL Technical Drawing, 1 pagine
B40DSS Disegni e schemi Baumatic B40DSS Technical Drawing, 1 pagine
BMMI170SS Disegni e schemi Baumatic BMMI170SS Technical Drawing, 1 pagine
BHG695SS Disegni e schemi Baumatic BHG695SS Technical Drawing, 1 pagine
BDF465W Disegni e schemi   Baumatic BDF465W Technical Drawing, 1 pagine
BHI300 Disegni e schemi   Baumatic BHI300 Technical Drawing, 1 pagine
BO610.5SS Disegni e schemi   Baumatic BO610.5SS Technical Drawing, 1 pagine
BHC300 Disegni e schemi Baumatic BHC300 Technical Drawing, 1 pagine