Рет қаралды 8,872
WPA or WiFi Protected Access is the next generation of WEP. Developed due to WEP Security's vulnerability to attacks. The WPA encryption algorithm uses the Temporal Key Integrity Protocol (TKIP) or you can also use the Advanced Encryption Standard (AES) with higher encryption capabilities. The development of WPA is WPA2 which in the encryption process can use a combination of TKIP and AES.
In terms of authentication, WPA/WPA2 can use EAP or Extensible Authentication Protocol which can be used to implement CA Certificates. By implementing WPA EAP, we can implement authentication in wireless as an alternative to hotspot. Especially for end-user devices that support WPA Enterprise.
_________________________
Related articles and videos to study:
Dot1X Implementation on MikroTik
citraweb.com/a...
Dot1X Authentication With Username and Password
• Autentikasi Dot1X Deng...
Mikrotik Hotspot Video Playlist
• Hotspot Mikrotik
__________________________________
Purchase of network devices via:
citraweb.com/s...
Mikrotik Training Registration from Citraweb:
citraweb.com/t...
Questions regarding technical details can be submitted through Layanan Menu at citraweb.com/l...
#Authentication #WPA #hotspot #EAP #HotspotMikrotik #WirelessAuthentication #WiFiProtectedAccess #ExtensibleAuthenticationProtocol #MikrotikTutorial #CaptivePortal #MikroTik #MikrotikID #RouterBoard #Citraweb #CitrawebSolusiTeknologi #CST