
Long Range Wireless Access Point / Client Bridge Version 1.0
54
anunencrypted challenge textstring to any device attemptingto communicate
with the Access Point. The device requesting authentication encrypts the
challenge text and sends it back to the Access Point. If the challenge text is
encrypted correctly, the Access Point allows the requesting device to
authenticate. It is recommended
to select Auto if you are not sure which
authenticationtypeisused.
InputType:SelectHeorASCIIfromthedrop‐downlist
KeyLength:Selectakeyformatfromthedrop‐downlist.64bit‐hexkeysrequire
10characters,whereas128‐bitkeysrequire26
characters.Ahexkeyisdefined
asanumberbetween0through9andletterbetweenAthroughF.
Default Key:You mayuse uptofourdifferentkeysforfour different networks.
Selectthecurrentkeythatwillbeused.
Key1‐4:Youmayenter
fourdifferentWEPkeys.
ClickontheApplybuttontosavethechanges.
6.5.2.2 WirelessSecurity–WPA‐PSK,WPA2‐PSK
Security Mode:SelectWPA‐PSK, or WPA2‐PSK from the drop‐down list if your
wirelessnetworkusesWPApre‐sharedkey.
Encryption:SelectTKIPorAESfromthedrop‐downlistifyourwirelessnetwork
uses this encryption. WPA (Wi‐Fi Protected Access) was designed to improve
uponthesecurityfeaturesofWEP(WiredEquivalentPrivacy).Thetechnologyis
designedtoworkwithexistingWi‐Fiproductsthathave
beenenabledwithWEP.
WPA provides improved data encryption through the Temporal Integrity
Protocol (TKIP), which scrambles the keys using a hashing algorithm and by
adding an integrity checking feature which makes sure that keys haven’t been
tamperedwith.
Passphrase: Specifyapassphrase thatis shared amongst the Access
Points and
clients.
ClickontheApplybuttontosavethechanges.
Comentarios a estos manuales