SMC Networks SMC2552W-G2-17 User Manual
Page 111

System Configuration
6-64
6
Note:
You must enable data encryption through the web or CLI in order to enable all
types of encryption (WEP, TKIP, or AES) in the access point.
The access point can simultaneously support clients using various different security
mechanisms. The configuration for these security combinations are outlined in the
following table. Note that MAC address authentication can be configured
independently to work with all security mechanisms and is indicated separately in
the table. Required RADIUS server support is also listed.
WPA2 with 802.1X Requires WPA-enabled system
and network card driver (native
support provided in Windows
XP)
• Provides the strongest security in WPA2-only
mode
• Provides robust security in mixed mode for WPA
and WPA2 clients
• Offers fast roaming for time-sensitive client
applications
• Requires configured RADIUS server
• 802.1X EAP type may require management of
digital certificates for clients and server
• Clients may require hardware upgrade to be WPA2
compliant
WPA2 PSK Mode Requires WPA-enabled system
and network card driver (native
support provided in Windows
XP)
• Provides robust security in small networks
• Requires manual management of pre-shared key
• Clients may require hardware upgrade to be WPA2
compliant
Table 6-3. Security Combinations
Client Security
Combination
Configuration Summary
a
MAC
Authentication
b
RADIUS
Server
No encryption and no
authentication
Interface Detail Settings:
Authentication: Open System
Encryption: Disable
802.1x: Disable
Local, RADIUS,
or Disabled
Yes
3
Static WEP only (with
or without shared key
authentication)
Enter 1 to 4 WEP keys
Select a WEP transmit key for the interface
Interface Detail Settings:
Authentication: Shared Key or Open System
Encryption: Enable
802.1x: Disable
Local, RADIUS,
or Disabled
Yes
c
Dynamic WEP
(802.1x) only
Interface Detail Settings:
Authentication: Open System
Encryption: Enable
802.1x: Required
Set 802.1x key refresh and reauthentication rates
Local, RADIUS,
or Disabled
Yes
c
Table 6-2. Wireless Security Considerations
Security
Mechanism
Client Support
Implementation Considerations