| AES – AES has been developed to ensure the highest degree of |
| security and authenticity for digital information and it is the most |
| advanced solution defined by IEEE 802.11i for the security in the |
| wireless network. |
| Note: All devices in the network should use the same encryption |
| method to ensure the communication. |
WPA | The |
| letters or numbers. This same key must be used on all of the |
| wireless stations in the network. |
WEP Key | The WEP keys are used to encrypt data transmitted in the |
(Key1 ~ Key4) | wireless network. There are two types of key length: |
| |
| selected the radio button. |
| Fill the text box by following the rules below. |
| |
| range) or |
| the encryption keys. For example: “0123456aef“ or “test1”. |
| |
| range) or |
| the encryption keys. For example: |
| “01234567890123456789abcdef“ or “administrator”. |
3.2.1.3 802.1x Setting-Certification
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide
When an AP acting as an authenticator detects a wireless station on the LAN, it sends an
An example for MD5 Authentication
13