Vivotek PZ7112 User Manual

Page 45

Advertising
background image

VIVOTEK

User's Manual - 45

3�

WPA-PSK: Use WPA (Wi-Fi Protected Access) pre-shared key�

More secure than WEP, the Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to

address WEP’s weaknesses� Improvements included TKIP, which changes the encryption key for each

data transmission�

Algorithm: Choose one of the following algorithms for WPA-PSK and WPA2-PSK modes�

TKIP (Temporal Key Integrity Protocol): A security protocol used in IEEE 802�11 wireless networks�

TKIP is a “wrapper” that goes around the existing WEP encryption� TKIP is comprised of the same

encryption engine and RC4 algorithm defined for WEP; however, the key used for encryption in TKIP

is 128 bits long. This solves the first problem of WEP: a short key length. (From Wikipedia)

AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES), also

known as Rijndael, is a block cipher adopted as an encryption standard by the U�S� government�

As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography� (From

Wikipedia)

Pre-shared Key: Enter a key in ASCII format� The length of the key can be between 8 to 63 characters�

4�

WPA2-PSK: Use WPA2 pre-shared key�

This advanced protocol, certified through Wi-Fi Alliance’s WPA2 program, implements the mandatory

elements of 802�11i� In particular, it introduces a new AES-based algorithm, CCMP, that is considered

fully secure. From March 13, 2006, WPA2 certification is mandatory for all new devices wishing to be

certified by the Wi-Fi Alliance as “Wi-Fi CERTIFIED.” (From Wikipedia)

NOTE

► After wireless configurations are completed, click

Save and the camera will reboot� Wait for the live

image ito be reloaded to your browser� For VIVOTEK 7000-series cameras, you have to unplug the

power and Ethernet cables from the camera; then re-plug the power cable to the camera� The camera

will switch to wireless mode�

► Some invalid settings may cause the system to fail to respond. Change the configuration settings only

if necessary and consult with your network supervisor or experienced users for correct settings� Once

the system has lost contact, please refer to Maintenance on page 83 for reset and restore procedures�

Advertising