11-3
User Guide for Cisco Digital Media Player Device Manager 5.2.x
OL-15764-03
Chapter 11 Configure Network Settings
Concepts
Understand WEP Keys and Passphrases
Timesaver
Does your wireless network use WPA instead of WEP? If so, you can ignore this topic.
Many 802.11 access points (wireless routers) accept only a hexadecimal passphrase for WEP-64 and
WEP-128. And yet, DMPs accept only an ASCII passphrase for WEP. For this reason, it might be
necessary at times to translate your WEP passphrase from ASCII to hexadecimal.
Note
Many third-party converters are available. We do not offer any Cisco converter for this purpose.
S
Return to Top
SSID
Service Set ID. It is a unique identifier that client devices use to associate with the access point. The
SSID helps client devices distinguish among multiple wireless networks in the same vicinity. The SSID
can be any alphanumeric entry up to 32 characters long.
T
Return to Top
TKIP
Temporal Key Integrity Protocol, also known as key hashing, is used as part of server-based EAP
authentication.
W
Return to Top
WEP
Wired Equivalent Privacy is a method to encrypt data transmitted on a wireless network.
WEP keys
Wired equivalent privacy (WEP) keys are the IEEE 802.11b standard that offers a mechanism for
securing wireless LAN data streams. The goals of WEP include access control to prevent unauthorized
users who lack a correct WEP key from gaining access to the network, and privacy to protect wireless
LAN data streams by encrypting them and allowing de-encryption only by users with the correct
WEP keys.
WPA
Wi-Fi Protected Access. WPA is a standards-based, interoperable security enhancement that strongly
increases the level of data protection and access control for existing and future wireless LAN systems.
It is derived from and will be forward-compatible with the upcoming IEEE 802.11i standard. WPA
leverages TKIP for data protection and 802.1X for authenticated key management.
Summary of Contents for DMP 4305G
Page 9: ...P A R T 1 Before You Use DMPDM ...
Page 10: ......
Page 43: ...P A R T 2 Use DMPDM ...
Page 44: ......