EasyManua.ls Logo

Gemtek Goldcrest - Wireless Network Security Settings; Data Encryption Options Explained; Network Key Entry and Management

Default Icon
13 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Open: No authentication is used. Shared The Pre-Shared
Key (PSK) authentication method is used.
In enterprises, WPA will be used in conjunction with both
wireless router and authentication server. In Small Office/ Home
Office (SOHO) environment, where there are no authentication
servers, user can use pre-shared key
(PSK) mode in place of the
authentication server.
WPA: Wi-Fi® Protected Access (WPA) authentication
(802.1X) is used with an EAP type.
WPA consists of three main elements: an Authentication Server
(typically a RADIUS server), WPA-enabled router or AP (called
"Authenticator"), and a WPA-enabled client (called "Supplicant").
WPA-PSK: WPA authentication (802.1X) is used with a
Pre-Shared Key, which enables you to enter a static
Network key.
Data Encryption
Select the type of security encryption algorithm used. The
available types of encryption are based on the type of the
authentication selected.
Disabled: No encryption.
WEP: Deselect Network Key is provided for me
automatically and enter the Key provided by the network.
Available only with Open and Shared Authentication.
TKIP: Available with WPA and WPA-PSK Authentication.
TKIP (Temporal Key Integrity Protocol) includes four algorithms:
MIC (message integrity check), to protect packets from
tampering; PPK (Per-Packet Key) hashing, to prevent weak key
attacks; extended IV (initialization vector), to reduce IV reuse
and the possibility that a hacker will collect sufficient packets to
crack the encryption; and a re-
temporal key dynamically. TKIP is the most commonly used
encryption method; however, if your wireless clients do not
support TKIP, the WX-5803 also supports AES (Advanced
Encryption Security) encryption. AES will replace 802.11's
RC4-based encryption under 802.11i specification.
Network key
Enter the security key for data encryption, when WEP or
WPA-PSK is selected. This can be entered in ASCII or