User's Manual
Table Of Contents
- Chapter 1 Introduction
- Chapter 2 Network Configuration
- Chapter 3 Hardware Installation
- Chapter 4 Initial Configuration
- Chapter 5 System Configuration
- Chapter 6 Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- SNMP Commands
- Flash/File Commands
- RADIUS Client
- 802.1x Port Authentication
- Filtering Commands
- Interface Commands
- interface
- dns server
- ip address
- ip dhcp
- shutdown
- speed-duplex
- show interface ethernet
- radio-mode
- select-antenna-mode
- description
- ssid-broadcast
- closed-system
- speed
- channel
- ssid
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- authentication
- encryption
- key
- transmit-key
- transmit-power
- max-association
- multicast-cipher
- wpa-clients
- wpa-mode
- wpa-preshared-key
- wpa-psk-type
- shutdown
- show interface wireless
- show station
- IAPP Commands
- VLAN Commands
- Appendix A Troubleshooting
- Appendix B Specifications
- Appendix C Cables and Pinouts
- Glossary
- Index
System Configuration
5-46
Wired Equivalent Privacy (WEP)
WEP provides a basic level of security, preventing unauthorized
access to the network and encrypting data transmitted between
wireless clients and the access point. WEP uses static shared
keys (fixed-length hexadecimal or alphanumeric strings) that are
manually distributed to all clients that want to use the network.
WEP is the security protocol initially specified in the IEEE 802.11
standard for wireless communications. Unfortunately, WEP has
been found to be flawed. For more robust wireless security, the
SMC2552W-G provides Wi-Fi Protected Access (WPA) for
improved data encryption and user authentication.
Setting up shared keys enables the basic IEEE 802.11 Wired
Equivalent Privacy (WEP) on the access point to prevent
unauthorized access to the network.
If you choose to use WEP shared keys instead of an open
system, be sure to define at least one static WEP key for user
authentication and data encryption. Also, be sure that the WEP
shared keys are the same for each client in the wireless network.










