AirPro
DWL-6000AP
Authentication
You must choose the type of authentication used for WEP. The differences between the choices are
explained below.
•
Open System:
Using an open system with WEP enabled means the access point and wireless
stations encrypt only the data in each packet. WEP is not used for the purpose of authentication,
that is, encryption does not prevent any station from associating with the access point.
•
Shared Key:
With this setting only stations using a shared key encryption identified by the access
point are allowed to associate with it. Shared key WEP prohibits non-WEP WLAN stations from
associating with the access point. Shared key WEP uses encryption for both data and
authentication.
•
Open System/Shared Key:
With this setting both shared and open system are employed.
Stations have the option of using either but must still have the correct key to decrypt data.
•
802.
1x:
If you use 802.1x you do not need to supply a WEP key. This is an access control system
used for Ethernet and wireless networks and a key is generated automatically from a server or
switch. In order to use 802.1x you must have the system running on your network. That is, you
need a Radius server or computer or switch capable of implementing PAE. After applying the
settings and restarting the Access Point, you must choose to use a Radius server or a local server
or switch for Authentication. Use the Encryption menu to select where authentication information
comes from and what size key to use.
WEP Key Type and Size
WEP keys are defined by the type (HEX or ASCII) of characters entered and size in bits. HEX or
Hexadecimal characters are numbers and the letters A – F, upper and lower case are recognized as
the same for HEX characters. ASCII characters include all printable characters (including spaces)
available on a standard keyboard. ASCII upper and lower cases are recognized as different characters.
The size of the key relates to the level of encryption complexity. Keep in mind however that throughput
can be affected by WEP and the higher the level of complexity, the more it will influence throughput.
This should not be a problem for most users however, even at the highest levels.
Key Table and the Valid Key
Use the Key Table to define the WEP keys according to the restriction you have selected (key size
and type). The Key Table will allow only keys of the correct size and type to be entered. If you should
enter a key of an incorrect character type or size an error message informs you when you attempt to
apply the changes. The Valid Key determines which Key (Key 1 to Key 4) encrypts and decrypts the
transmitting and received by the access point. Make sure you configure your wireless adapters exactly
the same way. That is, make sure that Key 1 on the access point is the exactly the same as Key 1 on
the adapters, and so on for the other keys in the table.
16
Summary of Contents for AirPro DWL-6000AP
Page 72: ...AirPro DWL 6000AP 70 ...