4 - 14 CA50/UCA Client & Server Developer & User Guide
Wireless Security Protocols for the CA50
CA50 wireless security is based on underlying Fusion support. At each CA50 release, a subset of voice-friendly
security modes are validated for use with CA50 voice.
Currently, the CA50 supports the following security protocols. The most secure are listed first:
•
WPA2-AES (see note 1)
•
WPA-TKIP (see note 1)
•
WEP 128 (see note 3)
•
WEP 40
•
Open (see note 2)
WPA2-AES is the most secure; in addition, it is typically slightly faster than WPA-TKIP due to improvements in the
protocol.
WPA-TKIP provides a good balance between security and roam times. It can also serve as stand-in for WPA2-AES
for advanced debugging: WPA-TKIP can be decrypted with a full wireless snooper capture, while WPA2-AES
cannot.
1
NOTE
The use of an authentication server is not recommended for voice.
2
NOTE
Recommended for diagnosis and fast roaming.
3
Consider if it meets security needs. WEP is a natural fast roamer.
NOTE