198:
22:
142:
interface, where the EEG acts a bridge between the two. The client devices have client-side authentication/encryption software, and the EEGs are the encryption termination point in the network. Benefits of these devices include offloading the encryption duties from the
39:
86:
58:
65:
239:
72:
258:
179:
54:
169:
105:
43:
134:
for data across a wireless medium. Unlike a residential gateway, an enterprise gateway typically has both an
79:
268:
232:
213:
263:
32:
225:
144:
8:
205:
175:
147:. Autonomous access points are placed downstream from the EEGs and may act as an
209:
252:
131:
21:
197:
123:
148:
139:
135:
127:
46:. Unsourced material may be challenged and removed.
250:
233:
130:, that allows for strong authentication and
240:
226:
106:Learn how and when to remove this message
167:
251:
192:
44:adding citations to reliable sources
15:
174:. Jones & Bartlett Publishers.
171:Wireless and Mobile Device Security
13:
14:
280:
196:
20:
55:"Enterprise encryption gateway"
31:needs additional citations for
161:
126:encryption device, similar to
1:
154:
120:enterprise encryption gateway
259:Wireless networking hardware
212:. You can help Knowledge by
7:
168:Doherty, Jim (2014-12-23).
10:
285:
191:
40:improve this article
206:wireless technology
204:This article about
269:Encryption devices
221:
220:
181:978-1-284-05928-1
116:
115:
108:
90:
276:
242:
235:
228:
200:
193:
186:
185:
165:
111:
104:
100:
97:
91:
89:
48:
24:
16:
284:
283:
279:
278:
277:
275:
274:
273:
249:
248:
247:
246:
190:
189:
182:
166:
162:
157:
151:authenticator.
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
282:
272:
271:
266:
264:Wireless stubs
261:
245:
244:
237:
230:
222:
219:
218:
201:
188:
187:
180:
159:
158:
156:
153:
114:
113:
28:
26:
19:
9:
6:
4:
3:
2:
281:
270:
267:
265:
262:
260:
257:
256:
254:
243:
238:
236:
231:
229:
224:
223:
217:
215:
211:
207:
202:
199:
195:
194:
183:
177:
173:
172:
164:
160:
152:
150:
146:
145:access points
141:
137:
133:
129:
125:
121:
110:
107:
99:
96:February 2022
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
214:expanding it
203:
170:
163:
119:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
122:(EEG) is a
253:Categories
155:References
132:encryption
66:newspapers
124:layer 2
80:scholar
178:
149:802.1X
82:
75:
68:
61:
53:
208:is a
87:JSTOR
73:books
210:stub
176:ISBN
140:WLAN
138:and
59:news
136:LAN
128:VPN
118:An
42:by
255::
241:e
234:t
227:v
216:.
184:.
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.