Configuring with Web Based Management
5.9 "Security" menu
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
223
–
WPA/WPA2-Auto
Setting with which an access point can process both the "WPA" as well as the "WPA2"
type of authentication. This is necessary when the access point communicates with
different clients, some using "WPA" and others "WPA2". The same encryption method
is set on the clients
●
Encryption
Encryption protects the transferred data from eavesdropping and corruption. You can
only disable encryption if you have selected "Open System" for authentication. All other
security methods include both authentication and encryption.
●
Cipher
Select the encryption method. The selection depends on the transmission standard.
–
AUTO
AES or TKIP is used depending on the capability of the other station.
–
WEP
WEP (Wired Equivalent Privacy)
A symmetrical stream encryption method with only 40- or 104-bit long keys based on
the RC4 algorithm (Ron’s Code 4).
–
TKIP (Temporal Key Integrity Protocol)
A symmetrical encryption method with the RC4 algorithm (Ron’s Code 4). In contrast
to the weak WEP encryption, TKIP uses changing keys derived from a main key. TKIP
can also recognize corrupted data frames.
–
AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that
further improves the functions of TKIP.
Note
To provide better protection of your data against attacks, use WPA2/ WPA2-PSK with
AES.
●
WPA(2) Pass Phrase
Enter a WPA(2) key here. This WPA(2) key must be known both at the client end and on
the access point and is entered by the user at both ends.
ASCII code 0x20 to 0x7e is used for the WPA(2) key.
●
WPA(2) Pass Phrase Confirmation
Confirm the entered WPA(2) key.
●
Default key
Specify the WEP key used to encrypt the data. You define the WEP key on the "Keys"
page.