Network Security
   
   
      The Extreme Networks
         ExtremeWireless
          system
         provides features and functionality to control network access. These are based on standard
         wireless network security practices.
      Current wireless network security methods provide protection. These methods include:
      
         - Shared Key authentication that relies on Wired Equivalent Privacy (WEP) keys
- Open System that relies on Service Set Identifiers (SSIDs)
- 802.1x that is compliant with Wi-Fi Protected Access (WPA)
- Captive Portal based on Secure Sockets Layer (SSL) protocol
The Extreme Networks
         ExtremeWireless
          system
         provides the centralized mechanism by which the corresponding security parameters are
         configured for a group of users.
      
         - Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks defined in the 802.11b standard
- Wi-Fi Protected
            Access version 1 (WPA1™) with Temporal Key Integrity Protocol
            (TKIP)
- Wi-Fi Protected
            Access version 2 (WPA2™) with Advanced Encryption Standard (AES) and
            Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)