Wireless Broadband Router User Manual
38
Integrity Protocol (TKIP) utilizes a stronger encryption
algorithm and includes Message Integrity Code (MIC) to
provide protection against hackers.
AES: Only for WPA and WPA-PSK. Advanced Encryption
System (AES) utilizes a symmetric 128-Bit block data
encryption. Its the strongest encryption currently available.
Shared Key Authentication: Authentication is a process in which
the AP validates whether the wireless client is qualified to access the
APs service. Select Optional or Required.
Optional: The authentication is done through a pseudo
process, accepting all kinds of requests, mainly used in
cases where connectivity is more important than security.
Required: Utilizes WEP capability to further verify if a
wireless client is authorized to share this APs resource. If
the client has the wrong key or no key, the authentication
will fail and will not be allowed to associate with the AP.
If you select Optional, wireless stations with or without correct WEP
keys can be authenticated by the AP.
If Required is selected, you must enable WEP function and define
your WEP keys. The keys are used both to authenticate wireless
clients and encrypt outgoing data.
Network Key 1~4: Enter one to four WEP keys in either ASCII or
Hexadecimal format. You can use 64 bits or 128 bits as the
encryption algorithm.
Note that when using Hexadecimal format, only digits 0-9 and letters
A-F, a-f are allowed. Valid key length for each encryption type is as
below:
Key Length HEX Format ASCII Format
64 Bit 10 hexadecimal digits 5 ASCII characters
128 Bit 26 hexadecimal digits 13 ASCII characters
Current Network Key: Aside from entering the WEP keys, select
one of the entered keys to encrypt the data before transmission. The
AP always transmits data encrypted using the selected WEP Key.
The receiving station will use the key number to determine which