Encryption, Extended service set (ess), Essid (extended service set identifier) – Asus USB-N66 User Manual

Page 23: Ethernet, Firewall, Gateway

Advertising
background image

USB-N66 WLAN Adapter User Manual

23

ASUS WLAN adapter

Encryption

This provides wireless data transmissions with a level of security. This option

allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains

10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26

hexadecimal digits or 13 ASCII characters.

64-bit and 40-bit WEP keys use the same encryption method and can

interoperate on wireless networks. This lower level of WEP encryption uses

a 40-bit (10 hexadecimal digits assigned by the user) secret key and a 24-bit

Initialization Vector assigned by the device. 104-bit and 128-bit WEP keys use

the same encryption method.

All wireless clients in a network must have identical WEP keys with the access

point to establish connection. Keep a record of the WEP encryption keys.

Extended Service Set (ESS)

A set of one or more interconnected basic service set (BSSs) and integrated

local area networks (LANs) can be configured as an Extended Service Set.

ESSID (Extended Service Set Identifier)

�ou must have the same ESSID entered into the gateway and each of its

wireless clients. The ESSID is a unique identifier for your wireless network.

Ethernet

The most widely used LAN access method, which is defined by the IEEE 802.3

standard. Ethernet is normally a shared media LAN meaning all devices on the

network segment share total bandwidth. Ethernet networks operate at 10Mbps

using CSMA/CD to run over 10-BaseT cables.

Firewall

A firewall determines which information passes in and out of a network. NAT

can create a natural firewall by hiding a local network’s IP addresses from the

Internet. A Firewall prevents anyone outside of your network from accessing

your computer and possibly damaging or viewing your files.

Gateway

A network point that manages all the data traffic of your network, as well as to

the Internet and connects one network to another.

ICS

ICS is used to share one computer’s Internet connection with the rest of the

computers on your network. When this computer is connected to the Internet,

all the communications to and from the Internet on your network are sent

through this computer which is called the host computer. The rest of the

computers can send and receive e-mail messages and access the web as if it

were connected directly to the Internet.

Advertising