•WEP: Enables the WEP Data Encryption. When the item is selected, you need to continue setting the WEP Encryption keys.
•TKIP: The Temporal Key Integrity Protocol changes the temporal key every 10,000 packets (a kind of message transmitted over a network.)
This ensures much greater security than the standard WEP security.
•AES: AES has been developed to ensure the highest degree of security and authenticity for digital information. It’s the most advanced solution defined by IEEE 802.11i for security in the wireless network.
NOTE: All devices in the network should use the same encryption method to ensure the security of communications.
WPA
WEP Key
•
•
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients (802.1x Setting/Certification below) and servers (802.1x Setting/CA Server below) on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide
When an AP acting as an authenticator detects a wireless station on the LAN, it sends an EAP request for the user’s identity to the device. In turn, the device responds with its identity, and the AP relays this identity to an authentication server (typically an external RADIUS server).