Wep configuration – Teletronics TT 2400 User Manual

Page 23

Advertising
background image

a hashing algorithm and, by adding an integrity-

checking feature, ensures that the keys haven’t been

tampered with.

AES

o Advanced Encryption Standard (Rijndael Cypher) is the U.S. government's next-generation

cryptography algorithm, which will replace DES and 3DES. AES works at multiple network layers
simultaneously. Supports 128, 192 and 256 bit keys. AES and 802.11i(WEP version 2) is based on
32bit processing unlink the older standard.

TKIP and AES

o If clients support both the TKIP and AES standards then this would be the strongest cipher type to use.

that combines both the TKIP and AES security.



PSK

PSK stands for Pre-Shared-Key and serves as a password. User may key in a 8 to 63 characters string to set the
password or leave it blank, in which the 802.1x Authentication will be activated. Note that if user key in own password,
make sure to use the same password on client's end.

WEP Configuration


Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11b
standard. WEP is designed to provide the same level of security as that of a wired LAN.


Enable WEP

To enable the WEP Authenticator


Default WEP key to use

WEP Key 1-4


Select the key to be used as the default key. Data transmissions are always encrypted using the default key. The other
keys can only be used to decrypt received data.


Authentication

Open - Open system authentication involves a two-step authentication transaction sequence. The first step in
the sequence is the identity assertion and request for authentication. The second step in the sequence is the
authentication result. If it is “successful”, The station shall be mutually authenticated. Open system
authentication does not provide authentication. It provides identification using the wireless adapter's MAC
address. Open system authentication is used when no authentication is required. It is the default
authentication algorithm.


Open system authentication uses the following process:

1. The authentication-initiating wireless client sends an IEEE 802.11 authentication management frame that contains

its identity.


2. The receiving wireless AP checks the initiating station's identity and sends back an authentication verification

frame.


3. With some wireless APs, you can configure the MAC addresses of allowed wireless clients. However, configuring

the MAC address does not provide sufficient security because the MAC address of a wireless client can be
spoofed.

Advertising
This manual is related to the following products: