About Wi-Fi Protected Access (WPA V1 and WPA V2)

Note

Note

To achieve the strongest encryption protection for your VNS, it is recommended that you use WPA v.1 or WPA v.2.

WPA v1 and WPA v2 add authentication to WEP encryption and key management. Key features of WPA privacy include:

The encryption portion of WPA v1 is Temporal Key Integrity Protocol (TKIP). TKIP includes:

The encryption portion of WPA v2 is Advanced Encryption Standard (AES). AES includes:

The following is an overview of the WPA authentication and encryption process:

  1. The wireless device client associates with Wireless APs.
  2. Wireless AP blocks the client's network access while the authentication process is carried out (the controller sends the authentication request to the RADIUS authentication server).
  3. The wireless client provides credentials that are forwarded by the controller to the authentication server.
  4. If the wireless device client is not authenticated, the wireless client stays blocked from network access.
  5. If the wireless device client is authenticated, the controller distributes encryption keys to the AP and the wireless client.
  6. The wireless device client gains network access via the AP, sending and receiving encrypted data. The traffic is controlled with permissions and role applied by the controller.