EasyManuals Logo

Hitron CVE-30360 User Manual

Hitron CVE-30360
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #80 background imageLoading...
Page #80 background image
80
HITRON CVE-30360 USER’S GUIDE
WIRELESS
WEP Settings
NOTE: These fields are only configurable when you select WEP from the Security
Mode list.
WEP Key Length Use this field to specify the length of the security key
used to allow wireless devices to join the network. The
longer the key, the more secure it is.
Select 64-bit to use a ten-digit security key.
Select 128-bit to use a twenty-six-digit security key.
WEP Key 1~4 Use these fields to define the security keys that all
wireless devices on the network must use to join the
network.
The CVE-30360 supports up to four WEP keys, of which
you can select one as the default. You should input the
same four keys, in the same order, in your network’s
wireless clients. Your CVE-30360 and your wireless
clients can use different default keys, as long as all four
keys are present and in the same order. If your wireless
client supports only a single WEP key, use the CVE-
30360’s default key.
Enter the keys in hexadecimal format (using the digits
0~9 and the letters A~F).
Default WEP Key Select the number of the security key that you want the
CVE-30360 to use as its default authentication key for
transmissions.
Authentication Select the authentication mode that you want to use:
Select Open System to allow wireless clients to
authenticate (identify themselves) to the CVE-30360
before presenting their security credentials (WEP
keys).
Select Shared Key to use the WEP key in the
authentication process. When a client wants to
associate, the CVE-30360 sends an unencrypted
challenge message. The client must use the WEP
key to encrypt the challenge message and return it to
the CVE-30360, which then decrypts the message
and compares the result with its original message.
Open System authentication is the more secure of the
two authentication types, since while the Shared Key
system appears more robust, it is possible to derive
secure data by capturing the challenge messages.
Select Automatic to have the CVE-30360 choose
the authentication method.
TABLE 26: The Wireless > Security Screen (continued)

Table of Contents

Other manuals for Hitron CVE-30360

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Hitron CVE-30360 and is the answer not in the manual?

Hitron CVE-30360 Specifications

General IconGeneral
BrandHitron
ModelCVE-30360
CategoryNetwork Router
LanguageEnglish

Related product manuals