64-bit WEP with 10 hexadecimal digits
('0-9', 'A-F')
Key1=
0x
123456789A
Key2=
0x
23456789AB
Key3=
0x
3456789ABC
Key4=
0x
456789ABCD
128 bit
(26 Hex Digit)
WEP Key type
Example
128-bit WEP with 13 characters
Key1= 2e3f4w345ytre
Key2= 5y7jse8r4i038
Key3= 24fg70okx3fr7
Key4= 98jui2wss35u4
128-bit WEP with 26 hexadecimal digits
('0-9', 'A-F')
Key1=
0x
112233445566778899AABBCDEF
Key2=
0x
2233445566778899AABBCCDDEE
Key3=
0x
3344556677889900AABBCCDDFF
Key4=
0x
44556677889900AABBCCDDEEFF
*Hexadecimal digits have to preceded by '
0x
'
WEP Key 1 – 4
Follow the example above to setup either character or hexadecimal key according to the key length.
WEP key to use
Select one pre-defined WEP key to use for authentication.
Deny unencrypted data
When the WEP authentication is enabled any unencrypted data will be blocked from getting pass this unit from the
receiving side.
Shared key Authentication
Shared key authentication supports authentication of stations as either a member of those who know a shared secret
key or a member of those who do not. Shared key authentication is not secure and is not recommended for use. It
verifies that an authentication-initiating station has knowledge of a shared secret. This is similar to pre-shared key
authentication for Internet Protocol security (IPSec). The 802.11 standard currently assumes that the shared secret is
delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802.11.
In practice, a user manually types this secret for the wireless AP and the wireless client.
Shared key authentication uses the following process:
1. The authentication-initiating wireless client sends a frame consisting of an identity assertion and a request for
authentication.
2. The authenticating wireless node responds to the authentication-initiating wireless node with challenge text.
3. The authentication-initiating wireless node replies to the authenticating wireless node with the challenge text
that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret.
4. The authentication result is positive if the authenticating wireless node determines that the decrypted
challenge text matches the challenge text originally sent in the second frame. The authenticating wireless node
sends the authentication result.
Because the shared key authentication secret must be manually distributed and typed, this method of authentication
does not scale appropriately in large infrastructure network mode, such as corporate campuses.
Summary of Contents for EzBridge 5800
Page 1: ...EzBridge 5800 User Manual 500mW ...
Page 18: ...Configuration ...
Page 22: ...Administration ...