User Manual

29
WEP
WEP, short for Wired Equivalent Privacy, is a protocol for wireless LANs or local area networks.
This WEP is defined in the 802.11 Standard. WEP is designed so security levels are maintained at
the same level as the wired LAN. WEP's aim is to provide security by encrypting data over radio
waves. WEP protects data as it's transmitted from one end point to another. WEP is used at the
two lowest layers, the data link and physical layer. WEP is designed to make up for the inherent
security in wireless transmission as compared to wired transmission.
Use the following steps to configure WEP:
1.
Select Network Authentication type from the 802
.
11
A
u
th
e
nt
i
c
a
t
i
o
n
drop-down list.
(
S
h
a
r
e
d
is better than
o
p
e
n
)
2.
Select
En
a
b
le
d
from the W
E
P
En
c
r
y
pt
i
o
n
drop-down list.
3.
Specify the encryption key from the
C
u
rr
e
nt
N
e
t
w
or
k
K
ey
drop-down list.
4.
Enter the key into the
N
e
t
w
or
k
Key field 1~4. (Enter 5 ASCII characters or 10
Hexadecimal digits for a 64-bit key. Enter 13 ASCII characters or 26 Hexadecimal
digits for a 64-bit key.)
5.
Click the
A
pp
ly
button to apply settings.
802.1X
802.1X is the IEEE standard for access control for wireless and wired LANs, 802.1X provides a
means of authenticating and authorizing devices to attach to a LAN port. This standard defines
the Extensible Authentication Protocol (EAP), which uses a central authentication server to
authenticate each user on the network. A RADIUS server is required for authentication.
Use the following steps to configure 802.1X:
1.
Select Network Authentication type from the 802
.
11
A
u
th
e
nt
i
c
a
t
i
o
n
drop-down list.
(
S
h
a
r
e
d
is better than
o
p
e
n
)
2.
Select
En
a
b
le
d
from the 802
.
1
X
A
u
th
e
nt
i
c
a
t
i
o
n
drop-down list.
3.
Enter your
R
A
D
I
US
5
e
r
v
e
r
IP
address,
P
or
t
and
K
ey
.
4.
Configure W
E
P
En
c
r
y
pt
i
o
n
(see above for detail).
5.
Click the
A
pp
ly
button to apply settings.
WPA/WPA2
Wi-Fi Protected Access was designed to provide improved data encryption, perceived as
weak in WEP, and to provide user authentication, largely nonexistent in WEP.
To take full advantage of WPA, a RADIUS server is needed in your network to authenticate users.
For most home or SOHO users, WPA-PSK is the easiest way to implement and provides adequate
protection for your wireless network.