Wireless LAN – WLAN
BAT54-Rail/F..
Release
 
7.54
 
06/08
3.3
 
Protecting the wireless network
49
The standard WEP key consists of the first letter “L” followed by the LAN 
MAC address of the access point in ASCII characters. The LAN MAC ad-
dresses of the BAT devices always begin with the character string “00A057”. 
You will find the LAN MAC address on a sticker on the base of the device. 
Only use the character string labelled as “MAC address” that starts with 
“00A057”. The other addresses that may be found are not the LAN MAC ad-
dress.
A device with the LAN MAC address “00A0570FB9BF” thus has a standard 
WEP key of “L00A0570FB9BF”. This key is entered into the ‘Private WEP 
settings’ of the device for each logical WLAN network as ‘Key 1’.
Note: To use a WLAN client to connect to a new (unconfigured) BAT access 
point, the WEP128 encryption must be activated in the WLAN client and 
the 13-character standard WEP key must be programmed in as described 
above.
3.3.3 Background WLAN scanning
In order to identify other access points within the device's local radio range, 
the BAT Wireless Router can record the beacons received (management 
frames) and store them in the scan table. Since this recording occurs in the 
background in addition to the access points' "normal" radio activity, it is called 
a "background scan". 
Background scanning is mainly used for the following tasks:
D Rogue AP detection
D Fast roaming for WLAN clients
U Rogue AP detection
WLAN devices that make unauthorized attempts at accessing a WLAN by 
posing as an access point or client are called rogues. An example of rogue 
APs are access points that a company's employees connect to the network 
without the knowledge or permission of the system administrators, thereby 
consciously or unconsciously making the network vulnerable to potential at-