Whenever you communicate over the Internet using a wired or wireless connection,
you may want to ensure that your communications and files are private and
If your transmissions are not secure, you take the risk of others intercepting
your business e-mails, examining your corporate files and records, and using
your network and Internet connection to distribute their own messages and
When data reaches the access point or gateway, it is unencrypted and unprotected
while it is being transmitted out on the public Internet to its destination ---
unless it is also encrypted at the source with SSL when purchasing on the
Internet or when using a VPN.
So while using WPA will protect you from external intruders, you may want to
implement additional techniques to protect your transmissions when you use
public networks and the Internet.
Extended EAP (Extensible Authentication Protocol) is an addition to the Wi-Fi
Protected Access- (WPA?) and WPA2? - Enterprise certification programs, which
further ensures the interoperability of secure Wi-Fi networking products for
enterprise and government users.
WPA2 (Wi-Fi Protected Access 2) provides network administrators with a high
level of assurance that only authorized users can access the network.
Based on the ratified IEEE 802.11i standard, WPA2 provides government grade
security by implementing the National Institute of Standards and Technology
(NIST) FIPS 140-2 compliant AES encryption algorithm.
WPA2 - Enterprise verifies network users through a server.
WPA utilizes 128-bit encryption keys and dynamic session keys to ensure your
wireless network's privacy and enterprise security.
For more information on WPA, visit the WPA Web page.
Visitors to the company, as well as mobile workers, can still have unfettered
access to the Internet and use standard e-mail protocols.
However, VPN access, which enables access to the corporate network, corporate
e-mail and communications systems, is provided only to those who've been given
Hardware and software firewall systems monitor and control the flow of data in
and out of computers in both wired and wireless enterprise, business and home