Asus WL-320gP User Manual - Page 32

WPA Encryption, WPA Pre-Shared Key, WEP Encryption, bit WEP Encryption

Page 32 highlights

3. Software Access Point Chapter 3 - Software Configuration WPA Encryption When "WPA-PSK" authentication method is used, the newly proposed TKIP (Temporal Key Integrity Protocol) or AES encryption schemes are applied. WPA Pre-Shared Key Select "TKIP" or "AES" in the WPA Encryption, this field is used as a password to begin the encryption process. 8 to 63 characters are required. WEP Encryption When "Open or Shared Key", "Shared Key" or "Radius with 802.1x" authentication methods are selected, traditional WEP encrption is applied. NOTE: When "WPA" or "WPA-PSK" authentication methods are selected, you still can set WEP encryption for those clients that do not support WPA/WPA-PSK. Please note that Key Index for WEP key is limited to 2 or 3 when both WPA and WEP encryption are supported at the same time. 64/128-bit versus 40/104-bit The following section explains low-level (64-bit) and high-level (128-bit) WEP Encryption schemes: 64-bit WEP Encryption 64-bit WEP and 40-bit WEP are the same encryption methods and can interoperate in a wireless network. This level of WEP encryption uses a 40-bit (10 Hex character) encryption scheme as a secret key, which is set by the user, and a 24-bit "Initialization Vector" scheme, which is not under user control. Together these two schemes make a 64-bit (40 + 24) encryption scheme. Some vendors refer to this level of WEP as 40-bit and others refer to this as 64-bit. ASUS WLAN products use the term 64-bit when referring to this lower level of encryption. 128-bit WEP Encryption 104-bit WEP and 128-bit WEP are the same encryption method and can interoperate on a wireless network. This level of WEP encryption uses a 104bit (26 Hex character) encryption scheme as a secret key which is set by the user, and a 24-bit "Initialization Vector", which is not under user control. 32 ASUS 802.11g Access Point

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74

3. Software
32
ASUS 802.11g Access Point
Chapter 3 - Software Configuration
Access Point
WPA Encryption
When “WPA-PSK” authentication method is used, the newly proposed
TKIP (Temporal Key Integrity Protocol) or AES encryption schemes are
applied.
WPA Pre-Shared Key
Select “TKIP” or “AES” in the WPA Encryption, this field is used as a
password to begin the encryption process. 8 to 63 characters are required.
WEP Encryption
When “Open or Shared Key”, “Shared Key” or “Radius with 802.1x”
authentication methods are selected, traditional WEP encrption is applied.
NOTE:
When “WPA” or “WPA-PSK” authentication methods are se-
lected, you still can set WEP encryption for those clients that do not
support WPA/WPA-PSK. Please note that Key Index for WEP key is
limited to 2 or 3 when both WPA and WEP encryption are supported
at the same time.
6±/128-bit versus ±0/10±-bit
The following section explains low-level (64-bit) and high-level (128-bit)
WEP Encryption schemes:
6±-bit WEP Encryption
64-bit WEP and 40-bit WEP are the same encryption methods and can
interoperate in a wireless network. This level of WEP encryption uses a
40-bit (10 Hex character) encryption scheme as a secret key, which is set
by the user, and a 24-bit “Initialization Vector” scheme, which is not under
user control.
Together these two schemes make a 64-bit (40 + 24) encryption scheme.
Some vendors refer to this level of WEP as 40-bit and others refer to this
as 64-bit. ASUS WLAN products use the term 64-bit when referring to this
lower
level of encryption.
128-bit WEP Encryption
104-bit WEP and 128-bit WEP are the same encryption method and can
interoperate on a wireless network. This level of WEP encryption uses a 104-
bit (26 Hex character) encryption scheme as a secret key which is set by the
user, and a 24-bit “Initialization Vector”, which is not under user control.