Rosewill RNX-G400 User Manual
Page 54

Wireless Router
RNX-G40 User Manual
4.15 What is Wi-Fi Protected Access (WPA)?
Wi-Fi's original security mechanism, Wired Equivalent Privacy (WEP), has been viewed as insufficient for 
securing confidential business communications. A longer-term solution, the IEEE 802.Hi standard, is under 
development. However, since the IEEE 802. Hi standard is not expected to be published until the end of 
2003, several members of the Wi-Fi Alliance teamed up with members of the IEEE 802. Hi task group to 
develop a significant near-term enhancement to Wi-Fi security. Together, this team developed Wi-Fi 
Protected Access. 
To upgrade a WLAN network to support WPA, Access Points will require a WPA software upgrade. Clients 
will require a software upgrade for the network interface card, and possibly a software update for the 
operating system. For enterprise networks, an authentication server, typically one that supports RADIUS and 
the selected EAP authentication protocol, will be added to the network. 
4.16 WhatisWPA2?
It is the second generation of WPA. WPA2 is based on the final IEEE 802.1H amendment to the 802.11 
standard. 
4.17 What is 802.lx Authentication?
802.lx is a framework for authenticated MAC-level access control, defines Extensible Authentication 
Protocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, which was 
defined for dial-up authentication with Point-to-Point Protocol in RFC 2284. 
Beyond encapsulating EAP packets, the 802. lx standard also defines EAPOL messages that convey the 
shared key information critical for wireless security. 
4.18 What is Temporal Key Integrity Protocol (TKIP)?
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.Hi encryption standard for 
wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 
802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying 
mechanism, thus fixing the flaws of WEP. 
4.19 What is Advanced Encryption Standard (AES)?
Security issues are a major concern for wireless LANs, AES is the U.S. government's next-generation 
cryptography algorithm, which will replace DES and 3DES. 
4.20 What is Inter-Access Point Protocol (IAPP)?
The IEEE 802.1 If Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability, enabling 
roaming of 802.11 Stations within IP subnet. 
IAPP defines messages and data to be exchanged between Access Points and between the IAPP and high 
layer management entities to support roaming. The IAPP protocol uses TCP for inter-Access Point 
communication and UDP for RADIUS request/response exchanges. It also uses Layer 2 frames to update 
the forwarding tables of Layer 2 devices. 
4.21 What is Wireless Distribution System (WDS)?
The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless channel, 
like the wireless bridge or repeater service. 
4.22 What is Universal Plug and Play (uPNP)?
UPnP is an open networking architecture that consists of services, devices, and control points. The ultimate 
goal is to allow data communication among all UPnP devices regardless of media, operating system, 
programming language, and wired/wireless connection. 
4.23 What is Maximum Transmission Unit (MTU) Size?
Maximum Transmission Unit (MTU) indicates the network stack of any packet is larger than this value will be 
fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate 
its MRU and will be accepted. The actual MTU of the PPP connection will be set to the smaller one of MTU 
and the peer's MRU. The default is value 1400. 
- 53 -
