Information about Wireless Networks
2
Intel® PRO/Wireless 2011B LAN Access Point Quick Installation Guide
A common way of implementing security and protecting
information is encryption. Before sending information over a
WLAN, the wireless device uses an encryption key to scramble
information before it is transmitted over a WLAN. The device
receiving the information uses the same key to decrypt or
unscramble the information. It is only readable to WLAN
devices that have the correct encryption key. You must use the
same key and encryption method for all wireless devices in the
WLAN. Otherwise, they cannot communicate with each other.
The network administrator provides encryption keys, either
directly or from an external key management service. The
administrator must propagate any changes to these keys to all
access points and wireless clients in a WLAN. Changing the
key on just one access point or wireless client, and without the
authority to do so, disconnects it from the rest of the network.
There are two Wired Equivalent Privacy (WEP) encryption
methods: 40/64-bit and 128-bit. To implement security, use
either one of these methods.