|
|
| The difference between WPA and WPA2 is that WPA2 provides |
|
|
| data encryption via the AES. In contrast, WPA uses Temporal Key |
|
|
| Integrity Protocol (TKIP). |
| Encryption Method |
| Security Off – Disable the encryption mode. |
|
|
| WEP – Enable the WEP Data Encryption. When the item is |
|
|
| selected, you have to continue setting the WEP Encryption keys. |
|
|
| TKIP – TKIP (Temporal Key Integrity Protocol) changes the |
|
|
| temporal key every 10,000 packets (a packet is a kind of message |
|
|
| transmitted over a network.) This insures much greater security |
|
|
| than the standard WEP security. |
|
|
| AES – AES has been developed to ensure the highest degree of |
|
|
| security and authenticity for digital information and it is the most |
|
|
| advanced solution defined by IEEE 802.11i for the security in the |
|
|
| wireless network. |
|
|
| Note: All devices in the network should use the same encryption |
|
|
| method to ensure the communication. |
| 802.1x Authentication |
| The EAP authentication protocols this device has supported are |
| Protocol |
| included as follows. This setting has to be consistent with the |
|
| wireless APs or Routers that the card intends to connect. | |
|
|
| |
|
|
| EAP/TLS (User Certificate) |
|
|
| EAP protocols but not easy to use. It requires that digital |
|
|
| certificates be exchanged in the authentication phase. The server |
|
|
| presents a certificate to the client. After validating the server’s |
|
|
| certificate, the client presents a client certificate to the server for |
|
|
| validation. |
| Passphrase |
| The |
|
|
| can be letters or numbers. This same key must be used on all of |
|
|
| the wireless stations in the network. |
| WEP Key(Key1 ~ Key4) |
| The WEP keys are used to encrypt data transmitted in the wireless |
|
|
| network. There are two types of key length: |
|
|
| Fill the text box by following the rules below. |
|
|
| |
|
|
| range) or |
|
|
| encryption keys. For example: “0123456aef“ or “test1”. |
|
|
| |
|
|
| range) or |
|
|
| the encryption keys. For example: |
|
|
| “01234567890123456789abcdef“ or “administrator”. |
|
|
|
|
27