Configuration
| Field | Description |
|
| Encryption | In infrastructure mode: |
|
|
| ||
|
| Disable – the communication is not encrypted. |
|
|
| WEP – the communication is encrypted using 64/128/256 bit WEP. |
|
|
| TKIP – replaces WEP with a stronger encryption algorithm. The |
|
|
| passwords change dynamically, and the change is synchronized be- |
|
|
| tween the access point and the wireless client. |
|
|
| AES – another encryption method, more secure than WEP. |
|
|
| In |
|
|
| Enable WEP – encryption is enabled. |
|
|
| Disable WEP – encryption is disabled. |
|
|
|
|
|
| Authen- | The following authentication modes are available: |
|
| tication | Open System - the simplest authentication method. The client |
|
| Mode | sends out a request and the access point authenticates it. There is |
|
|
| no encryption. |
|
|
| Shared Key – this method uses a WEP encrypted password for |
|
|
| authentication. The client will be authenticated by the access point |
|
|
| only if the passwords match. |
|
|
| Auto – in this mode, the access point provides the method for au- |
|
|
| thentication and the client uses the offered method, if available. |
|
|
| In the infrastructure mode, two more modes are available: |
|
|
| WPA – uses a combination of Open System and 802.1x authentica- |
|
|
| tion. First the wireless client authenticates with the access point, |
|
|
| then performs |
|
|
| WPA PSK - a WPA |
|
|
| 802.1x authentication. The authentication in this mode is based on |
|
|
| shared secrets, stored both on the access point and on the wireless |
|
|
| client. |
|
|
| WPA2 and WPA2 PSK – second generation of the |
|
|
| ed Access based on the final IEEE 802.11i amendment to the 802.11 |
|
|
| standard. |
|
|
|
|
|
17