Page 46 / 106 Scroll up to view Page 41 - 45
Using the Web-Based Advanced User Interface
44
Using the Broadcast SSID Feature
Note: This advanced feature should be employed by advanced users only.
For security, you can choose not to broadcast your network’s SSID. Doing so
will keep your network name hidden from computers that are scanning for the
presence of wireless networks. To turn off the broadcast of the SSID, remove
the check mark from the box next to “Broadcast SSID”, and then click “Apply
Changes”. The change is immediate. Each computer now needs to be set to
connect to your specific SSID; an SSID of “ANY” will no longer be accepted.
Refer to the documentation of your wireless network adapter for information
on making this change.
Protected Mode Switch
As part of the 802.11g specification, Protected mode ensures proper operation
of 802.11g clients and access points when there is heavy 802.11b traffic in
the operating environment. When Protected mode is ON, 802.11g scans for
other wireless network traffic before it transmits data. Therefore, using this
mode in environments with HEAVY 802.11b traffic or interference achieves
best performance results. If you are in an environment with very little—or
no—other wireless network traffic, your best performance will be achieved
with Protected mode OFF.
Page 47 / 106
45
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
Securing your Wi-Fi
®
Network
Here are a few different ways you can maximize the security of your
wireless network and protect your data from prying eyes and ears. This
section is intended for the home, home office, and small office user. At
the time of this User Manual’s publication, there are three encryption
methods available.
Name
64-bit Wired
Equivalent
Privacy
128-bit Wired
Equivalent Privacy
Wi-Fi Protected
Access-TKIP
Wi-Fi Protected
Access-AES
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP
WPA-AES
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption
keys based on
RC4 algorithm
(typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system-
generated data
TKIP (temporal
key integrity
protocol) added
so that keys
are rotated and
encryption is
strengthened
AES (Advanced
Encryption
Standard)
does not
cause any
throughput loss
WEP (Wired Equivalent Privacy)
WEP (Wired Equivalent Privacy) is a common protocol that adds security
to all Wi-Fi-compliant wireless products. WEP was designed to give
wireless networks the equivalent level of privacy protection as a
comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated data
(64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit
encryption. Shortly after the technology was introduced, researchers found
that 64-bit encryption was too easy to decode.
Page 48 / 106
Using the Web-Based Advanced User Interface
46
128-Bit WEP
As a result of 64-bit WEP’s potential security weaknesses, a more secure
method of 128-bit encryption was developed. 128-bit encryption includes
a key length of 104 bits plus 24 additional bits of system-generated data (128
bits total). Some hardware manufacturers refer to 128-bit as
104-bit encryption.
Most of the new wireless equipment in the market today supports both
64-bit and 128-bit WEP encryption, but you might have older equipment that
only supports 64-bit WEP. All Ativa wireless products will support both 64-bit
and 128-bit WEP.
Encryption Keys
After selecting either the 64-bit or 128-bit WEP encryption mode, it is critical
that you generate an encryption key. If the encryption key is not consistent
throughout the entire wireless network, your wireless networking devices will be
unable to communicate with one another on your network and you will not be
able to successfully communicate within your network.
You can enter your key by typing in the hex key manually, or you can type in
a passphrase in the “Passphrase” field and click “Generate” to create a key. A
hex (hexadecimal) key is a combination of numbers and letters from A–F and
0–9. For 64-bit WEP, you must enter 10 hex keys. For 128-bit WEP, you must
enter 26 hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
The WEP passphrase is NOT the same as a WEP key. Your Router uses this
passphrase to generate your WEP keys, but different hardware manufacturers
might have different methods on generating the keys. If you have multiple
vendors’ equipment in your network, the easiest thing to do is to use the hex
WEP key from your Router or access point and enter it manually into the hex
WEP key table in your Router’s configuration screen.
Page 49 / 106
47
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is a new Wi-Fi standard that was designed to
improve upon the security features of WEP. To use WPA security, the drivers
and software of your wireless equipment must be upgraded to support WPA.
These updates will be found on the wireless vendor’s website. There are two
types of WPA security, WPA-PSK (no server) and WPA (with radius server).
WPA-PSK (no server)
uses what is known as a pre-shared key as the
network key. A network key is basically a password that is between eight
and 63 characters long. It can be a combination of letters, numbers, or
characters. Each client uses the same network key to access the network.
Typically, this is the mode that will be used in a home environment.
For a list of Ativa wireless products that support WPA, please visit our
website at
www.ativasupport.com
.
Sharing the Same Network Keys
Most Wi-Fi products ship with security turned off. So once you have your
network working, you must activate WEP or WPA and make sure your
wireless networking devices are sharing the same network key.
Page 50 / 106
Using the Web-Based Advanced User Interface
48
�±²³´³µµ¶·¶¸¹º»³²
�±²³´³µµ¶·
¼¹»³½¹¹¾¶¿À²Á
�±²³´³µµ¶·¶
³µ¾»¹Ã¶¿À²Á
�±²³´³µµ¶·
³µ¾»¹Ã¶¿À²Á
Network key=
WRONG Password
Network key=
MyPassword
Network key=
MyPassword
Network key=
MyPassword
The Wireless G Desktop Card cannot access the network because it
is using a different network key than the network key that is configured on the
Wireless G Router.

Rate

3.5 / 5 based on 2 votes.

Popular Ativa Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top