![]() ![]() The ability to configure a dual-band router with the one-button-press approach (without this feature, the internal devices for each band would see themselves as separate APs, each requiring separate setup)Īdditionally, the JumpStart 2.0 client application interoperates with Windows Wireless Zero Config and can support third-party applications.Ītheros has implemented the security protocols and procedures using the same careful approach used in designing the company’s silicon solutions.The freedom to choose and change SSIDs or security parameters, enabling users to upgrade a WLAN that includes a client with a specific security parameter.The ability to replace an existing router while maintaining an existing configuration.Arguably the best implementation of the Wi-Fi Protected Setup, JumpStart 2.0 provides several additional features: Now, products using Atheros’ JumpStart 2.0 can be certified for Wi-Fi Protected Setup and display the identifier to signify interoperability of configuration mechanisms with other certified products.īased on a thorough understanding of the issues involved, Atheros is also able to provide an exceptionally flexible implementation of the protocols for use by customers. The Wi-Fi Alliance will certify products for implementation of the standard and has established a visual identifier to help consumers choose products that employ Wi-Fi Protected Setup. What is new in JumpStart 2.0 is the ability to initiate the appropriate protocols based on pushing buttons and observing LEDs.Īfter working on security configuration solutions for a number of years, Atheros has delivered this newest key security enabler for Wi-Fi products-JumpStart 2.0, Atheros’ implementation of the Push-Button Configuration setup procedure for Wi-Fi Protected Setup. All of these protocols are commonly used in security setup procedures from a variety of vendors and other sources. Using the PIN protocol, the WLAN’s registrar communicates the network name (SSID) and the Wi-Fi Protected Access pre-shared key (WPA2-PSK, the wireless industry’s strongest security standard) to enable security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |