Vivotek PZ7121 User Manual

Page 42

Advertising
background image

VIVOTEK - A Leading Provider of Multimedia Communication Solutions

42 - User's Manual

3�

WPA-PSK: Use WPA (Wi-Fi Protected Access) pre-shared key�

More secure than WEP, the Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to

address WEP’s weaknesses� Improvements included TKIP, which changes the encryption key for each

data transmission�

Algorithm: Choosing one of the following algorithm for WPA-PSK and WPA2-PSK modes�

TKIP (Temporal Key Integrity Protocol): A security protocol used in the IEEE 802�11 wireless networks�

TKIP is a “wrapper” that goes around the existing WEP encryption� TKIP comprises the same

encryption engine and RC4 algorithm defined for WEP. However, the key used for encryption in TKIP

is 128 bits long. This solves the first problem of WEP: a too-short key length. (From Wikipedia)

AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES),

also known as Rijndael, is a block cipher adopted as an encryption standard by the U�S� government�

As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography� (From

Wikipedia)

Pre-shared Key: Entering a key in ASCII format� The length of the key is 8 ~ 63�

4�

WPA2-PSK: Use WPA2 pre-shared key�

The advanced protocol, certified through Wi-Fi Alliance’s WPA2 program, implements the mandatory

elements of 802�11i� In particular, it introduces a new AES-based algorithm, CCMP, that is considered

fully secure. From March 13, 2006, WPA2 certification is mandatory for all new devices wishing to be

certified by the Wi-Fi Alliance as “Wi-Fi CERTIFIED.” (From Wikipedia)

NOTE

► After wireless configurations are completed, click

Save and the camera will reboot� Wait for the live

image is reloaded to your browser� For VIVOTEK 7000-series cameras, you have to unplug the power

cable and Ethernet cable from the camera; then re-plug the power cable to the camera� The camera

will switch to wireless mode�

► Some invalid settings may cause the system failing to respond. Change the Configuration only if

necessary and consult with your network supervisor or experienced users for correct settings� Once

the system has lost contact, please refer to Maintenace on page 75 for reset and restore procedures�

Advertising
This manual is related to the following products: