Network Security
The Extreme Networks
ExtremeWireless
system
provides features and functionality to control network access. These are based on standard
wireless network security practices.
Current wireless network security methods provide protection. These methods include:
- Shared Key authentication that relies on Wired Equivalent Privacy (WEP) keys
- Open System that relies on Service Set Identifiers (SSIDs)
- 802.1x that is compliant with Wi-Fi Protected Access (WPA)
- Captive Portal based on Secure Sockets Layer (SSL) protocol
The Extreme Networks
ExtremeWireless
system
provides the centralized mechanism by which the corresponding security parameters are
configured for a group of users.
- Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks defined in the 802.11b standard
- Wi-Fi Protected
Access version 1 (WPA1™) with Temporal Key Integrity Protocol
(TKIP)
- Wi-Fi Protected
Access version 2 (WPA2™) with Advanced Encryption Standard (AES) and
Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)