How is ITaP addressing security issues with PAL?
ITaP is committed to providing our users with a trusted computing environment. With the introduction of PAL2.0, users now have a choice as to the method they use to connect to Purdue’s wireless network: by using WPA or using a VPN (Virtual Private Network) connection. WPA, described above provides secure, authenticated access to PAL and give users the freedom to roam throughout coverage areas without losing their wireless connection (in most cases). VPN technology requires users to authenticate themselves before using the wireless network, and encrypts all of the data that is carried on the wireless network. With a VPN-secured connection, all of the wireless traffic is encrypted using a strong encryption algorithm (168-bit 3DES encryption, as compared to the 128-bit or even 40-bit encryption offered by WEP). This means that, in order to access PAL, users will be required to adjust their computer’s network settings to negotiate the VPN connection directly or use WPA, and then to login t