Symbol Technologies AP-5131 User Manual
Page 225

Configuring Access Point Security
6-39
3.
Configure the
Manual Key Settings
screen to modify the following:
NOTE
When entering Inbound or Outbound encryption or authentication keys, an
error message could display stating the keys provided are “weak”. Some
WEP attack tools invoke a dictionary to hack WEP keys based on
commonly used words. To avoid entering a weak key, try to not to produce
a WEP key using commonly used terms and attempt to mix alphabetic and
numerical key attributes when possible.
AH Authentication
AH provides data authentication and anti-replay services for the
VPN tunnel. Select the required authentication method from the
drop-down menu:
•
None - Disables AH authentication. The rest of the fields are
not active.
•
MD5 - Enables the Message Digest 5 algorithm requiring
128-bit (32-character hexadecimal) keys.
•
SHA1 - Enables Secure Hash Algorithm 1, requiring 160-bit
(40-character hexadecimal) keys.