User's Manual
Configuration Using the Wizards of Web Based Management
Operating Instructions SCALANCE W 788-1pro / SCALANCE W 788-2pro
C79000-G8976-C184-01
53
Level Authentication Encryption Cipher Encryption Key
Source
Lowest without disabled without not applicable
Low Shared Key enabled AUTO local
Middle 802.1x enabled WEP Server
High WPA (preshared
key)
enabled TKIP local
Highest WPA (Radius) enabled TKIP Server
Authentication
Authentication basically means that some form of identification is required. In the
case of network communications, authentication methods include those listed be-
low:
● Shared Key
A key must be specified for authentication.
● Authentication according to IEEE 802.1x
The authentication information is located on an external authentication server.
● WPA-PSK (Wi-Fi Protected Access - Preshared Key)
This method is based on a dynamic exchange of keys with the authentication
information being provided by the keywords used.
● WPA (Radius)
Implementation of the WPA method for use of an external radius server.
Encryption
The following schemes are used for data encryption:
● WEP (Wired Equivalent Privacy)
Symmetrical stream cipher (same key for encryption and decryption) with 40 or
104 bit long keys. Modification of the key must be done manually.
● AES (Advanced Encryption Standard)
Symmetrical block encryption scheme with 128, 192 or 256 bit long keys.
● TKIP (Temporal Key Integrity Protocol)
Symmetrical scheme in which new keys are generated cyclically.