Wireless Security Protocols For The Ca50 - Motorola CA50 Developer & User Manual

Table of Contents

Advertisement

4 - 14 CA50/UCA Client & Server Developer & User Guide

Wireless Security Protocols for the CA50

CA50 wireless security is based on underlying Fusion support. At each CA50 release, a subset of voice-friendly
security modes are validated for use with CA50 voice.
Currently, the CA50 supports the following security protocols. The most secure are listed first:
WPA2-AES (see note 1)
WPA-TKIP (see note 1)
WEP 128 (see note 3)
WEP 40
Open (see note 2)
WPA2-AES is the most secure; in addition, it is typically slightly faster than WPA-TKIP due to improvements in the
protocol.
WPA-TKIP provides a good balance between security and roam times. It can also serve as stand-in for WPA2-AES
for advanced debugging: WPA-TKIP can be decrypted with a full wireless snooper capture, while WPA2-AES
cannot.
1
NOTE
The use of an authentication server is not recommended for voice.
2
NOTE
Recommended for diagnosis and fast roaming.
3
Consider if it meets security needs. WEP is a natural fast roamer.
NOTE

Advertisement

Table of Contents
loading

Table of Contents