Network Connections
66
WEP Authentication:
•
Open System:
Allow any client to authenticate.
Since clients must still have a
valid WEP key in order to send or receive data, this setting does not make the
WEP protocol less secure, and is the recommended setting.
•
Shared Key:
Clients must use the WEP key to authenticate.
Warning
Due to flaws in the authentication protocol, this method reduces the security of
the WEP key. It is recommended that you use
Open System
authentication
instead.
•
Open System or Shared Key:
Allows clients to authenticate using either of the
above two methods.
WEP Key Length:
This sets the length of the WEP keys to be entered below.
It is
recommended to use 128 bit keys if possible.
WEP Key:
Enter up to 4 encryption keys.
These must be either 10 hexadecimal digits (0
– 9, A – F) for 64 bit keys, or 26 hexadecimal digits for 128 bit keys.
You must also
select one of the 4 keys to be the default transmit key.
WPA-PSK (aka WPA-Personal) security method
WPA-PSK (Wi-Fi Protected Access Preshared Key) is an authentication and encryption
protocol that fixes the security flaws in WEP.
This is the recommended security method.
WPA Encryption:
Select the encryption algorithm, either
TKIP
(Temporary Key Integrity
Protocol) or
AES
(Advanced Encryption Standard).
WPA Key:
Enter the WPA preshared key, which can be either 8 to 63 ASCII characters,
or 64 hexadecimal characters.
ACL (Access Control List)
When the
Access Control List
is disabled, any wireless client with the correct ESSID
(and encryption key if applicable) can connect to the wireless network.
For additional
security, you can specify a list of MAC address to either allow or deny.