User manual
Network Settings
myUTN User Manual Mac 46
mechanisms for data encryption and authentication. WEP uses a key
to encrypt the entire communication. As for encrypted access points,
the same WEP key must be used for the access point and the UTN
server.
Some access points convert WEP keys that are entered as ASCII text
into arbitrary hexadecimal values. In this case, the WEP keys for the
access point and the UTN server do not match. It is therefore recom-
mended to use hexadecimal WEP keys.
WPA/WPA2
In contrast to WEP, WPA (Wi-Fi Protected Access) offers enhanced
mechanisms for exchanging keys. The exchange key is only used at
the beginning of a session. Afterwards a session key is used. The key
is regenerated periodically. The WPA mechanism requires an authen-
tication at the beginning of a connection.
In the 'Personal Mode' authentication is done via the Pre Shared Key
(PSK). The PSK is a password with 8–63 alphanumerical characters.
The 'Enterprise Mode' uses the EAP authentication method.
An individual 128 bit key is used for data encryption after the
authentication. The encryption methods TKIP (Temporal Key Integ-
rity Protocol) and AES (Advanced Encryption Standard) are available
for the encryption of data.
Authentication
You can check the identity of a device or user by means of an
authentication method before they gain access to resources in the
network. The UTN server offers different variants of EAP (Extensible
Authentication Protocol) as authentication method. For further
information; see: ’How to Use Authentication Methods’ 97.
What Do You Want
To Do?
’Using the UTN Server (myUTN-54) in a Wireless Network’ 46
’Connecting the UTN Server to the Wired Network’ 49
Using the UTN Server (myUTN-54) in a Wireless Network
To operate the UTN server in a wireless network, the WLAN and
security settings of the UTN server must match those of the wireless
network.