D-Link DWS-3024L User Manual - Page 102

Static WEP Configuration, Static WEP, WEP IEEE 802.1X, Authentication, Open System

Page 102 highlights

D-Link Unified Access System User Manual If you select WEP as the Security Mode, additional fields display, as Figure 45 shows. Figure 45. Static WEP Configuration Table 13 describes the configuration options for WEP. Table 13. Static WEP Field Static WEP or WEP IEEE 802.1X Authentication WEP Key Type Description Static WEP uses static key management. You manually configure the same keys to encrypt data on both the wireless client and the AP. Dynamic WEP (WEP IEEE 802.1X) uses dynamically generated keys to encrypt client-toAP traffic. Dynamic WEP is more secure than Static WEP, but you need a RADIUS server to manage the keys. If you select WEP IEEE 802.1X, the screen refreshes, and there are no more fields to configure. The AP uses the global RADIUS server IP address and secret or the RADIUS server settings you specify for the VAP. The AP acts as the RADIUS client and must be configured as a client in the RADIUS server. For information about how to configure the global RADIUS server settings on the Unified Switch, see "Configuring AAA and RADIUS Settings" on page 85. Choose the authentication type: • Open System-No authentication is performed • Shared Key-Provides a rudimentary form of user authentication, which many experts consider to be less secure than Open System since it sends the WEP key to the client in plain text. • Both-Only WEP clients are authenticated. Select the key type by clicking one of the radio buttons: • ASCII-includes upper and lower case alphabetic letters, the numeric digits, and special symbols such as @ and # • Hex-includes digits 0 to 9 and the letters A to F 102 © 2001- 2008 D-Link Corporation. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

102
© 2001- 2008 D-Link Corporation.
All Rights Reserved.
D-Link Unified Access System User Manual
If you select WEP as the Security Mode, additional fields display, as
Figure 45
shows.
Figure 45. Static WEP Configuration
Table 13
describes the configuration options for WEP.
Table 13.
Static WEP
Field
Description
Static WEP or
WEP IEEE 802.1X
Static WEP uses static key management. You manually configure the same
keys to encrypt data on both the wireless client and the AP. Dynamic WEP
(WEP IEEE 802.1X) uses dynamically generated keys to encrypt client-to-
AP traffic. Dynamic WEP is more secure than Static WEP, but you need a
RADIUS server to manage the keys.
If you select WEP IEEE 802.1X, the screen refreshes, and there are no more
fields to configure. The AP uses the global RADIUS server IP address and
secret or the RADIUS server settings you specify for the VAP. The AP acts as
the RADIUS client and must be configured as a client in the RADIUS server.
For information about how to configure the global RADIUS server settings
on the Unified Switch, see
“Configuring AAA and RADIUS Settings”
on
page 85.
Authentication
Choose the authentication type:
Open System
—No authentication is performed
Shared Key
—Provides a rudimentary form of user authentication,
which many experts consider to be less secure than Open System since it
sends the WEP key to the client in plain text.
Both
—Only WEP clients are authenticated.
WEP Key Type
Select the key type by clicking one of the radio buttons:
ASCII
—includes upper and lower case alphabetic letters, the numeric
digits, and special symbols such as @ and #
Hex
—includes digits 0 to 9 and the letters A to F