Privacy settings are editable for the WPAv2 with PSK and WPA2 Enterprise w/ RADIUS authorization types.
To edit network privacy settings:
Protected Management Frames | Specifies the encryption status
of 802.11 management frames:
| ||||||
Fast Transition | (WPA2 Enterprise w/ RADIUS only) Enables fast transition for 11r enabled clients. | ||||||
WPA Key | (WPAv2PSK only) Specify the WPA key (a shared key) using a text string. | ||||||
WEP | We do not recommend or endorse using WEP encryption due to the security flaws that are inherent with WEP. Access is allowed to any client that knows the pre-shared WEP key. WEP-64 uses a 40 bit key concatenated with a 24-bit initialization vector (IV) to form the RC4 traffic key. WEP 64 is a less robust encryption scheme than WEP 128 (containing a shorter WEP algorithm for a hacker to potentially duplicate), but networks that require more security are at risk from a WEP flaw. WEP-128 uses a 104 bit key which is concatenated with a 24- bit initialization vector (IV) to form the RC4 traffic key. WEP 128 provides a more robust encryption algorithm than WEP 64 by requiring a longer key length and pass key. | ||||||
TKIP and TKIP-CCMP | We do not recommend or endorse TKIP ot TKIP-CCMP due to their inherent security flaws. Temporal Key Integrity Protocol (TKIP) encryption addresses WEP's weaknesses with a re-keying mechanism, a per-packet mixing function, a message integrity check and an extended initialization vector. However, TKIP also has vulnerabilities. (CCMP is a security standard used by the Advanced Encryption Standard (AES). AES serves the same function TKIP does for WPA-TKIP. CCMP computes a Message Integrity Check (MIC) using the proven Cipher Block Chaining (CBC) technique. Changing just one bit in a message produces a totally different result.) |