W6x User Manual
25
o
If you choose
Open System
, any client will be able to authenticate, as long as it
conforms to any MAC address filter policies you have set. In an open system,
authentication packets are sent without encryption.
o
If you choose
Shared Key
, the W6x sends a challenge text string (unencrypted) to
devices that try to communicate with the access point. The device that requests
authentication encrypts the challenge text and returns it to the access point. If the
challenge text is correctly encrypted, the access point authenticates the requesting
device.
If you don’t know which authentication type will be used, it’s recommended to select
Auto
.
Input Type
: Select
Hex
or
ASCII
.
Key Length
: Choose a key length. 64-bit hex keys require 10 characters, and 128-bit keys require
26 characters. (A hexadecimal key is in the format of a number between 0 through 9, and a
letter between A and F.)
Default Key
: You can specify 1-4 keys for up to four networks. Type the number of the key to be
used by default.
Keys 1-4
: You can enter up to four unique WEP keys.
Click
Save
to apply the changes. The
SSID profile
window will close and you need to click on
Accept,
under the
Network Settings
window, for the changes to take effect.
WPA-PSK, WPA2-PSK
When you select a wireless security
Type
, the configuration options for that mode appear.
WPA (Wi-Fi Protected Access) improves on the security features of WEP (Wired Equivalent Privacy).
WPA technology can work with existing Wi-Fi products that are enabled with WEP. WPA improves data
encryption using the Temporal Key Integrity Protocol (TKIP), which scrambles the encryption keys using
a hashing algorithm, and adds integrity checking to ensure that keys haven’t been tampered with.
If your wireless network uses WPA security
with a pre-shared key (PSK)
, select
WPA-PSK
or
WPA2-PSK
from the
Type
drop-down list. If your network doesn’t use a PSK, see the following section.