
transmitted over a network.) This insures much greater security
than the standard WEP security.
AES – AES has been developed to ensure the highest degree of
security and authenticity for digital information and it is the most
advanced solution defined by IEEE 802.11i for security in wireless
networks.
Note: All devices in a wireless network should use the same
encryption method to ensure proper communication.
WEP Keys can be in ASCII format. Alphanumeric values or signs
are allowed to be used for WEP keys. This is more recognizable for
users.
It is a text string with a maximum of 32 alphanumeric characters, for
example: “Test“. The WEP Key is created using the Passphrase
determined by you. This passphrase may not work with other
vendors‟ products due to possible incompatibility with that vendors‟
passphrase generators. You must use the same passphrase or
WEP key settings for all wireless computers within the network.
The keys are used to encrypt data transmitted in the wireless
network. Fill the text box by following the rules below.
64-bit – Input 10 Hex digits as the encryption key. For example:
“0123456aef“.
128-bit – Input 26 Hex digits as the encryption key. For example:
“01234567890123456789abcdef“.
Enter the same network key to confirm.
Select one of the four keys to be the data encryption key.
GTC – GTC is an authentication protocol which allows the
exchange of clear text authentication credentials across the
network
.
TLS – TLS is the most secure of the EAP protocols but not easy to
use. It requires that digital certificates be exchanged in the
authentication phase. The server presents a certificate to the client.
After validating the server‟s certificate, the client presents a client
certificate to the server for validation.
LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many
Comentarios a estos manuales