Operation Manual

VIVOTEK - A Leading Provider of Multimedia Communication Solutions
42 - User's Manual
3�
WPA-PSK: Use WPA (Wi-Fi Protected Access) pre-shared key
More secure than WEP, the Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to
address WEP’s weaknesses� Improvements included TKIP, which changes the encryption key for each
data transmission�
Algorithm: Choose one of the following algorithms for WPA-PSK and WPA2-PSK modes�
TKIP (Temporal Key Integrity Protocol): A security protocol used in IEEE 802�11 wireless networks�
TKIP is a “wrapper” that goes around the existing WEP encryption. TKIP is comprised of the same
encryption engine and RC4 algorithm dened for WEP; however, the key used for encryption in TKIP
is 128 bits long. This solves the rst problem of WEP: a short key length. (From Wikipedia)
AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES), also
known as Rijndael, is a block cipher adopted as an encryption standard by the U�S� government�
As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography(From
Wikipedia)
Pre-shared Key: Enter a key in ASCII format� The length of the key can be between 8 to 63 characters�
4�
WPA2-PSK: Use WPA2 pre-shared key
This advanced protocol, certied through Wi-Fi Alliance’s WPA2 program, implements the mandatory
elements of 802�11i� In particular, it introduces a new AES-based algorithm, CCMP, that is considered
fully secure. From March 13, 2006, WPA2 certication is mandatory for all new devices wishing to be
certied by the Wi-Fi Alliance as “Wi-Fi CERTIFIED.” (From Wikipedia)
NOTE
After wireless congurations are completed, click Save and the camera will reboot� Wait for the live
image ito be reloaded to your browserFor VIVOTEK 7000-series cameras, you have to unplug the
power and Ethernet cables from the camera; then re-plug the power cable to the camera. The camera
will switch to wireless mode�
► Some invalid settings may cause the system to fail to respond. Change the conguration settings only
if necessary and consult with your network supervisor or experienced users for correct settings� Once
the system has lost contact, please refer to Maintenance on page 77 for reset and restore procedures�