Document version: V1.0
25
Parameter description
It specifies the authentication type for the WEP security mode. The options include
Open, Shared. The options share the same encryption process.
⚫
Open: It specifies that authentication is not required and data exchanged is
encrypted with WEP. In this case, a wireless client can connect to the wireless
network corresponding to the selected SSID without being authenticated, and the
data exchanged between the client and the network is encrypted in WEP security
mode.
⚫
Shared: It specifies that a shared key is used for authentication and data exchanged
is encrypted with WEP. In this case, a wireless client must use a preset WEP key to
connect to the wireless network corresponding to the selected SSID. The wireless
client can be connected to the wireless network only if they use the same WEP key.
It specifies the WEP key for the Open or Shared encryption type.
For example, if Default Key is set to Key 2, a wireless client can connect to the
wireless network corresponding to the selected SSID only with the password specified
by Key 2.
4 WEP keys are allowed at the same time, but only the one specified by the Default
Key is valid. The key type includes ASCII and Hexadecimal.
⚫
ASCII: 5 or 13 ASCII characters are allowed in the key.
⚫
Hex: 10 or 26 hexadecimal characters (range: 0-9, a-f, and A-F) are allowed in the
key.
◼
WPA-PSK, WPA2-PSK, and Mixed WPA/WPA2-PSK
They belong to pre-shared key or personal key modes, where Mixed WPA/WPA2-PSK supports
both WPA-PSK and WPA2-PSK.
WPA-PSK, WPA2-PSK, and Mixed WPA/WPA2-PSK adopt a pre-shared key for authentication, while
the AP generates another key for data encryption. This prevents the vulnerability caused by static
WEP keys, and makes the three security modes suitable for ensuring security of home wireless
networks. Nevertheless, because the initial pre-shared key for authentication is manually set and
all clients use the same key to connect to the same AP, the key may be disclosed unexpectedly.
This makes the security modes not suitable for scenarios where high security is required.