III.Wired Equivalent Privacy (WEP)
WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address.
When selecting WEP encryption, click the “Use WEP Security” to enable the WEP security function.
u
u
IV. 802.1x Security
To address the shortcomings of WEP for authentication, the industry is working towards solutions based on the 802.1x specification, which is based on the Extensible Authentication Protocol (EAP). EAP was designed with flexibility in mind, and it has been used as the basis for a number of network authentication extensions.
Click to enable the 802.1x security function.
uKey Size: select either 64bit or
uGroup Key Setting:
No Rekeying: the clients will not need to
Rekeying Time: Type in the time in minutes when clients will need to
Rekeying packets: Type in the amount of packets that will be transmitted before clients will need to
V.Wi-Fi Protected Access (WPA)
ØDisable WPA Security: to disable the WPA security.
13