Toshiba WRC-1000 User Manual page 59

Wireless routing center
Hide thumbs Also See for WRC-1000:
Table of Contents

Advertisement

Authentication Mode: Authentication is a process in which the AP validates
whether wireless clients are qualified to access the AP's service. A wireless client
must be validated before it can associate with an AP. The IEEE802.11 defines two
types of algorithms in authentication: "open" and "shared" key.
With open key, the authentication is done through a pseudo process, accepting all
kinds of requests, mainly used in cases where connectivity is more important than
security. Shared key, on the other hand, utilizes WEP capability to further verify if
the wireless client is authorized to share this AP's resource. If the client has the
wrong key or no key, it will fail authentication and will not be allowed to associate
with the AP.
If WEP is enabled ...
Select your authentication mode: Both, Open or Shared. Both allows the
wireless client to use either authentication method. The authentication type must be
the same on the Access Point and wireless stations to be able to communicate.
If WEP is disabled ...
If WEP is disabled, the Authentication Mode is automatically set to Open.
WEP Key Type and WEP Keys: For flexibility, you can enter the WEP keys in
either ASCII or Hexadecimal format. Select a format and then enter the key
values in the WEP keys 1-4 fields. All four fields need to be entered.
Note that when using Hexadecimal format, only digits 0-9 and letters A-F, a-f are
allowed. Valid key length for each encryption type is as below.
HEX Format
64 bit
10 hexadecimal digits
128 bit
26 hexadecimal digits
Aside from entering your WEP keys, you should select one of the four keys to
encrypt the data before being transmitted. The AP always transmits data encrypted
using this WEP key. The key number (1,2,3,4) is also transmitted. The receiving
station will use the key number to determine which key to use for decryption. If the
key value does not match with the transmitting station, the decryption will fail. To
ensure successful decryption, have your wireless stations set identical key tables.
NOTE: All Wireless Stations must use identical encryption algorithm
level and Key values (same key position in its key table) to ensure
successful data transmission.
Wireless LAN Security
ASCII Format
5 ASCII characters
13 ASCII characters
4-21

Advertisement

Table of Contents
loading

Table of Contents