| Note: All devices in the network should use the same encryption method to |
| ensure the communication. |
WPA | The |
| numbers. This same key must be used on all of the wireless stations in the |
| network. |
WEP Key | The WEP keys are used to encrypt data transmitted in the wireless network. |
(Key1 ~ Key4) | There are two types of key length: |
| encryption key from Key 1 to Key 4 by selected the radio button. |
| Fill the text box by following the rules below. |
| |
| ASCII characters (including |
| example: “0123456aef“ or “test1”. |
| |
| |
| For example: “01234567890123456789abcdef“ or “administrator”. |
3.2.2.1 802.1x Setting - Certification
The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide
When an AP acting as an authenticator detects a wireless station on the LAN, it sends an
- 15 -