Manual
Table Of Contents
- Local Disk
- Dell Wireless 4350 Small Network Access Point User's Guide
- Introduction: Dell Wireless 4350 Small Network Access Point User's Guide
- Wireless Networking Overview: Dell Wireless 4350 Small Network Access Point User's Guide
- A Look at the Hardware: Dell Wireless 4350 Small Network Access Point
- Installation and Configuration: Dell Wireless 4350 Small Network Access Point User's Guide
- Configuration of the Access Point
- Connecting the Access Point to the network
- How to obtain the IP Address of the Access Point
- Setting Wireless Encryption in Your Access Point
- How to turn off Broadcast SSID?
- Setting Up File & Printer Sharing
- How to setup wireless clients to connect to the Access Point
- Using Your Access Point: Dell Wireless 4350 Small Network Access Point User's Guide
- Factory Default Settings: Dell Wireless 4350 Access Network Access Point User's Guide
- Setup Wizard: Dell? Wireless 4350 Small Network Access Point User's Guide
- Dell Wireless 4350 Small Network Access Point User's Guide
- Web-Based Configuration Tool: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Technical Specifications and Regulatory Information: Dell Wireless 4350 Small Network Access Point User's Guide
- Help Frames
- Dell Wireless 4350 Small Network Access Point User's Guide
- Dell Wireless 4350 Small Network Access Point User's Guide
- Wireless Networking Overview: Dell Wireless 4350 Small Network Access Point User's Guide
- A Look at the Hardware: Dell Wireless 4350 Small Network Access Point
- Introduction: Dell Wireless 4350 Small Network Access Point User's Guide
- Configuration of the Access Point
- Connecting the Access Point to the network
- How to obtain the IP Address of the Access Point
- Setting Wireless Encryption in Your Access Point
- How to turn off Broadcast SSID?
- Setting Up File & Printer Sharing
- How to setup wireless clients to connect to the Access Point
- Installation and Configuration: Dell Wireless 4350 Small Network Access Point User's Guide
- How to Configure the Access Point via the Control Utility: Dell Wireless 4350 Small Network Access Point User's Guide
- Factory Default Settings: Dell Wireless 4350 Access Network Access Point User's Guide
- Setup Wizard: Dell? Wireless 4350 Small Network Access Point User's Guide
- Dell Wireless 4350 Small Network Access Point User's Guide
- Web-Based Configuration Tool: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Using Your Access Point: Dell Wireless 4350 Small Network Access Point User's Guide
- How to Configure the Access Point via the Control Utility: Dell Wireless 4350 Small Network Access Point User's Guide
- Basic Settings: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Device Status: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- System Tools: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Advanced Settings: Dell Wireless 4350 Small Network Access Point User's Guide
- Hardware Installation
- Software Configuration Menu
- Wireless Attributes Menu
- Supported Features Menu
- Troubleshooting Menu
- Other Menu
- Glossary Menu
- Configuration of the Access Point
- Connecting the Access Point to the network
- Setting Wireless Encryption in Your Access Point
- How to turn off Broadcast SSID?
- Setting Up File & Printer Sharing
- How to setup wireless clients to connect to the Access Point
- How to Configure the Access Point via the Control Utility: Dell Wireless 4350 Small Network Access Point User's Guide
- Basic Settings: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Device Status: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- System Tools: Dell TrueMobile 2300 Wireless Broadband Router User's Guide
- Advanced Settings: Dell Wireless 4350 Small Network Access Point User's Guide
- A Look at the Hardware: Dell Wireless 4350 Small Network Access Point
- Hardware Installation Menu
- Software Configuration
- Wireless Attributes
- Supported Features
- Troubleshooting
- Other
A common way of implementing security and protecting information is encryption. Encryption applies a set of instructions, called an
algorithm, to information. The instructions combine the plain or clear text of information with a sequence of hexadecimal numbers,
called an encryption key.
Before transmitting information over the airwaves, the wireless client or access point encrypts or scrambles the information. The
access point or wireless client receiving the information uses the same key to decrypt or unscramble the information. The
information is only readable to WLAN devices that have the correct encryption key. The longer the key is, the stronger the
encryption.
The Dell Wireless 4350 Small Network Access Point supports both Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access
(WPA).
WEP
WEP (Wired Equivalent Privacy) provides a way of creating an encrypted key that is shared between a wireless client (such as a
notebook with a wireless PC card) and the router. In the Dell Wireless 4350 Small Network Access Point, WEP is an optional
feature that can be enabled or disabled. When WEP encryption is enabled, you must set the WEP key in the client to match the
WEP key used by the access point because you can ONLY connect to access points that have a matching WEP Key. The Dell
Wireless 4350 Small Network Access Point Setup Wizard allows the user to gracefully configure WEP encryption on both the
access point and wireless clients.
NOTE:It is better to change keys frequently. The same algorithm is used for all the communications that should be protected. If
the same key is used, the same message will give exactly the same cipher text. Then, it will be possible for an
eavesdropper to break the encrypted data. For this reason, it is strongly recommended to change keys often.
There are two WEP encryption methods:
·
40(64)-bit Encryption
·
104(128)-bit Encryption
40-bit and 64-bit encryption are identical. Some vendors use the term 40-bit; others use 64-bit. A wireless device that claims to
have 40-bit encryption interoperates with a device that claims to have 64-bit encryption; the same is true for the reverse. A 40(64)-
bit key consists of 10 hexadecimal numbers, arrayed as follows:
Key #1: 1011121314
Key #2: 2021222324
Key #3: 3031323334
Key #4: 4041424344
A 104(128)-bit key has several trillion times as many possible combinations than a 40(64)-bit key. It consists of 26 hexadecimal
numbers, arrayed as follows:
Key (#1): 101112131415161718191A1B1C
All wireless clients and access points in a WLAN must use the same encryption method and key. The following two examples
stress how important this point is.
Example 1
The encryption method for an access point is 40(64)-bit. The method for a wireless client is 104(128)-bit encryption. The client and
access point cannot communicate with each other, even though the selected key is the same. To resolve this problem, set the
access point to use 104(128)-bit encryption.
Example 2
The encryption method is the same for the access point and wireless client. You select key 1 for the access point and key 2 for
the wireless client. The wireless client cannot communicate with the WLAN. To resolve this problem, select key 1 for the wireless
client.
NOTE:Use the same key and encryption method for the wireless devices in the WLAN. Otherwise, they cannot communicate