Wireless Encryption Methods in Cisco

However, because it is one of the industry standards algorithms and complies with the IEEE 802.11i standard, AES is the preferable method to utilize for protecting a wireless network.AES performs the same tasks as TKIP (Temporal Key Integrity Protocol), but it also leverages information from the MAC header to add a sequence number to the encrypted data header and enables destination hosts to determine whether the non-encrypted bits have been altered. Linksys is the Cisco subsidiary responsible for wireless devices for Small Office Home Office (SOHO). Instead of WPA or WPA2, Linksys APs may use something known as a Pre-shared Key (PSK). The following are comparable PSKs:

  • WPA2 is the same as PSK or PSK2 with TKIP
  • WPA2 is the same as PSK or PSK2 with AES
  • PSK2 without a specified encryption method is the same as WPA2

A wireless LAN can be secured in three ways:

  • Disable APs’ SSID broadcasting
  • Activate MAC address filtering and only permit recognized clients.
  • Utilize WPA2 (or at least WPA)

Note: Be careful; relying solely on the first two security measures won’t adequately protect your network. Even SSIDs that are not broadcast can be found using specialized software like Netstumbler, and MAC addresses can be copied.


Wireless Encryption Methods in Cisco

Wireless encryption uses authentication protocols to secure your wireless network. A password or network key is required when a user or device attempts to connect. An unsecured wireless network can allow unauthorized users to access the network to obtain personal information or use your Internet connection to conduct malicious or illegal activities. Network speed and performance can be degraded when other people use your network without your knowledge.

  • 64-bit encryption: This configuration requires a password of 10 characters if using hexadecimal digits (0-9 and A-F) and 8 characters if using ASCII characters.
  • 128-bit encryption: This configuration requires passwords of 26 characters when using hexadecimal digits and 14 characters when using ASCII characters.

Similar Reads

Types of Wireless Encryption:

In wireless networks, protection is provided using an authentication process through wireless encryption.  Each time a user or device tries to connect, a password or network key is required. Unauthorized users may access your wireless network and obtain personal information, or they may use your internet connection for nefarious or unlawful purposes if it is not secure. If others use your network without your awareness, your network performance or speed may suffer....

Wireless Encryption Methods in Cisco:

However, because it is one of the industry standards algorithms and complies with the IEEE 802.11i standard, AES is the preferable method to utilize for protecting a wireless network.AES performs the same tasks as TKIP (Temporal Key Integrity Protocol), but it also leverages information from the MAC header to add a sequence number to the encrypted data header and enables destination hosts to determine whether the non-encrypted bits have been altered. Linksys is the Cisco subsidiary responsible for wireless devices for Small Office Home Office (SOHO). Instead of WPA or WPA2, Linksys APs may use something known as a Pre-shared Key (PSK). The following are comparable PSKs:...