Configuring the AP

2.6Encryption Configuration and Key Maintenance

The Encryption Key Maintenance screens allow the user to configure the encryption keys used for the site network. The Key Width determines which encryption Key screen displays. To enable the Open System option, select Disabled for Shared Key from the System Summary screen.

This table shows the association capability with the selected Key Width.

AP Selected WEP

MU Selected WEP

Association Status

Algorithm

Algorithm

 

 

 

 

Open (disable)

Open

Associated

Open (disable)

40

No Association

Open (disable)

128

No Association

40

Open

No Association

40

40

Associated

40

128

Associated, but cannot

 

 

transmit data

128

Open

No Association

128

40

Associated, but cannot

 

 

transmit data

128

128

Associated

Each 40-bit encryption key is a subset of the respective 128-bit encryption key. The first 40 bits of each encryption key is the same for the respective 40-bit and 128-bit encryption keys. When a 40-bit encryption key is changed the first 40 bits of the respective 128-bit key is also changed. Consequently, when a 128-bit encryption key is changed the first 40 bits of the 40-bit encryption key is changed. Moreover, configuring the encryption Keys using the SNMP Trap Manager overrides the Key value(s) for the AP(s) accessed by the SNMP Trap Manager.

Symbol provides a total of four Encryption Keys. Each key enables encryption between the AP and an associated MU with the same encryption Key and Key value.

88

AP-4131 Access Point Product Reference Guide

Page 98
Image 98
Symbol Technologies AP-4131 manual Encryption Configuration and Key Maintenance

AP-4131 specifications

The Symbol Technologies AP-4131 is a high-performance access point designed for businesses seeking reliable wireless networking solutions. With its robust features and advanced technologies, the AP-4131 paves the way for seamless connectivity in a variety of environments, including offices, warehouses, and retail spaces.

One of the standout features of the AP-4131 is its support for dual-band operation, enabling it to efficiently transmit and receive data across both 2.4 GHz and 5 GHz frequency bands. This dual-band functionality minimizes interference and allows for optimal performance even in densely populated areas with multiple wireless devices.

The AP-4131 employs the 802.11a/b/g/n standards, offering data rates of up to 300 Mbps. This capability ensures that users experience fast and reliable wireless connectivity, whether for bandwidth-intensive applications or simple web browsing. Additionally, its MIMO (Multiple Input Multiple Output) technology significantly enhances the signal quality and overall network performance, allowing more devices to connect simultaneously without degrading performance.

In terms of security, the AP-4131 provides advanced encryption protocols, including WPA2, to safeguard data transmission and mitigate the risk of unauthorized access. This emphasis on security is vital for organizations handling sensitive information and needing to protect their networks from potential threats.

The device is also equipped with Power over Ethernet (PoE) support, simplifying installation by allowing power and data to use a single cable. This feature enables flexible placement of the access point without the need for separate power sources, making it convenient for deployment in various locations.

Moreover, the AP-4131 features built-in management capabilities, allowing IT administrators to monitor and manage network performance easily. Its centralized management system facilitates the quick configuration of access points across the organization, streamlining maintenance and troubleshooting processes.

Another notable characteristic of the AP-4131 is its rugged design, built to withstand harsh environmental conditions. This makes it suitable for outdoor deployments or areas subject to extreme temperatures and conditions.

In summary, the Symbol Technologies AP-4131 is an advanced access point that combines dual-band performance, robust security features, and flexible deployment options, making it a valuable asset for businesses aiming to enhance their wireless networking capabilities. Its combination of cutting-edge technologies and reliable performance positions it as a top choice for organizations looking to build a strong, secure, and efficient wireless infrastructure.