| their access point or gateway, as well as in each wireless station in the |
| network. |
| unauthorized users that don't have the matching password from joining the |
| network, while encrypting the data traveling between authorized devices. |
| WPA2 – Like WPA, WPA2 supports IEEE 802.1 x/EAP authentications or |
| PSK technology. It also includes a new advanced encryption mechanism |
| using the Advanced Encryption Standard (AES). AES is required to the |
| corporate user or government users. The difference between WPA and WPA2 |
| is that WPA2 provides data encryption via the AES. In contrast, WPA uses |
| Temporal Key Integrity Protocol (TKIP). |
| |
| between |
| encryption via the AES. In contrast, |
| Protocol (TKIP). |
|
|
Use 802.1x | Enable 802.1x wireless authentication. Please click ‘802.1x Setting’ button to |
| set 802.1x parameters. (See next section). |
Encryption Mode | None – Disable the encryption mode. |
| WEP – Enable the WEP Data Encryption. When the item is selected, you |
| have to continue setting the WEP Encryption keys. |
| TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key |
| every 10,000 packets (a packet is a kind of message transmitted over a |
| network.) This insures much greater security than the standard WEP security. |
| AES – AES has been developed to ensure the highest degree of security and |
| authenticity for digital information and it is the most advanced solution defined |
| by IEEE 802.11i for the security in the wireless network. |
| Note: All devices in the network should use the same encryption method to |
| ensure the communication. |
WPA | The |
| numbers. This same key must be used on all of the wireless stations in the |
| network. |
WEP Key | The WEP keys are used to encrypt data transmitted in the wireless network. |
(Key1 ~ Key4) | There are two types of key length: |
| encryption key from Key 1 to Key 4 by selected the radio button. |
|
|