
Configuration Using Web Based Management and the Command Line Interface
C79000-G8976-C184-07
166
ncryption Methods
● WEP (Wired Equivalent Privacy)
A weak, symmetrical stream encryption method with only 40- or 104-bit long
orithm (Ron’s Code 4).
ption, TKIP uses changing keys derived
from a main key. TKIP can also recognize corrupted packets.
S (Advanced Encryption Standard)
thm
E
If you have selected Open System including encryption or Shared Key as the
authentication, you will need to define a key in the Keys menu (see Section 6.4.2).
keys based on the RC4 alg
If you have selected WPA-PSK or WPA (RADIUS) as the authentication, the
following alternatives are available in the Cipher box:
● TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Ron’s Code
4). In contrast to the weak WEP encry
● AE
Strong symmetrical block encryption method based on the Rijndael algori
that further improves the functions of TKIP.
Operating Instructions SCALANCE W78x
Comentários a estes Manuais