User Manual
Disable: Data are unencrypted during transmission when this option is selected.
WEP: WEP, Wired Equivalent Privacy, is a data encryption mechanism based on
a 64-bit, 128-bit or 152-bit shared key. Select WEP as the security type from the
drop down list as desired.
Key Length: The key size of WEP encryption can be 64bit, 128bit or
152bit.
WEP auth method: You can select the appropriate value: Open system
(If enabling this mode, there is no need authentication to access AP or
Wireless NIC) or Shared (Only those who are sharing the same key with
the AP can connect with it).
Key Index: You can select the Key which you want to use. Other
wireless station must have the same key value to connect with this
device, 4 different WEP keys can be configured at the same time, but
only one is used. Effective key is set with a choice of WEP Key 1, 2, 3 or
4.
WEP Key #: You can chose either HEX or ASCII for your WEP key value,
for 64bit encryption strength can use 10 digits for HEX (0~9, a~f and A-
F) or 5 digits for ASCII (0~9, a~z and A~Z), for 128bit encryption
strength can use 26 digits for HEX (0~9, a~f and A-F) or 13 digits for
ASCII (0~9, a~z and A~Z), for 152bit encryption strength can use 32
digits for HEX (0~9, a~f and A-F) or 16 digits for ASCII (0~9, a~z and
A~Z)
WPA-PSK (or WPA2-PSK): WPA-PSK is short for W-Fi Protected Access-Pre-
Shared Key. WPA-SPK uses the same encryption way with WPA, and the only
difference between them is that WPA-PSK recreates a simple shared key,
instead of using the user’s certification.
Cipher Suite: You can chose use AES or TKIP with your WPA / WPA2
encryption method,
AES is short for Advanced Encryption Standard. The AES cipher is
specified as a number of repetitions of transformation rounds that
convert the input plaintext into the final output of ciphertext. Each
round consists of several processing steps, including one that depends
on the encryption key. A set of reverse rounds are applied to transform
ciphertext back into the original plaintext using the same encryption
key.
TKIP is short for “Temporal Key Integrity Protocol. TKIP scrambles the
keys using a hashing algorithm and, by adding an integrity-checking
feature, ensures that the keys haven’t been tampered with.
Group Key Update Period: This time interval for re-keying GTK
(broadcast/multicast encryption keys) in seconds. Enter the time-
length required; the default time is 600 seconds.