The Privacy tab contains options you can use to enter settings regarding transmission privacy.
You must check the Monitor Privacy Settings checkbox to activate the functions. The functions are:
Function | Description |
---|---|
Base 802.11 Authentication |
Open - When this checkbox is selected, open system authentication does not actually provide authentication; it only performs identity verification through the exchange of two messages between the initiator (Wireless Client) and the receiver (wireless ). Shared - When selected, shared key authentication provides authentication by verifying that an initiator has knowledge of a shared secret. Under the 802.11 standard, it is assumed that the shared secret is sent to the wireless over a secure channel that is independent of 802.11. In practice, the shared key authentication secret is manually distributed and typed. |
Extended 802.11 Authentication |
WPA - Select to activate Wi-Fi Protected Access, which uses improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven't been tampered with. WPA2 - Short for Wi-Fi Protected Access 2, this checkbox enables the follow on security method to WPA for wireless networks that provide stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication. Symbol KeyGuard - When this checkbox is selected, it activates Symbol KeyGuard authentication protocols, which is provided by Symbol. |
Advanced Key Generation |
PSK (preshared key) - When selected, it activates the Pre-shared Key authentication. 802.1x EAP-FAST - When selected, it keys 802.1X EAP Flexible Authentication via Secure Tunneling. 802.1x EAP-TLS - When selected, it keys EAP Transport Level Security. 802.1x EAP-TTLS - When selected, it keys EAP Tunneled Transport Layer Security. 802.1x EAP-GTC - When selected, it keys EAP Generic Token Card. 802.1x RSA/PKA - When selected, it keys EAP RSA Public Key Authentication Protocol. 802.1x RSA/SID - When selected, it keys EAP RSA SecurID. 802.1x PEAP - When selected, it keys any 802.1X Protected Extensible Authentication Protocol (PEAP). 802.1x LEAP - When selected, it keys EAP Lightweight Extensible Authentication Protocol. 802.1x Other EAP - Keys any 802.1x EAP authentication/key distribution mechanism other than the types previously mentioned. |
802.11 Encryption |
Unencrypted Allowed - Select this checkbox to allow no 802.11 encryption for wireless traffic. TKIP - When selected, this enables the BSS to advertise support for Temporal Key Integrity Protocol (TKIP). WEP - When selected, causes the BSS and Wireless Client to use WEP as their encryption policy. AES (CCMP) - When selected, causes the BSS to advertise support for Advanced Encryption Standard (AES-CCMP). |
Other Encryption |
Cranite - When selected, enables AP usage of Layer 3 Cranite encryption. AirFortress - When selected enables AP usage of Layer 3 Airfortress encryption. IP-Sec - When selected, enables AP usage of Layer 3 IP security protocol as encryption. Other Ethertypes allowed - When selected, enables AP usage of other Layer 3 encryption mechanism which is not specified here. |