Netgear WAG102 WAG102 Reference Manual - Page 47
Data Encryption, Passphrase., Key 1, Table 2-2. Data Encryption Settings - bridge mode
UPC - 606449028799
View all Netgear WAG102 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 47 highlights
ProSafe Dual Band Wireless Access Point WAG102 Reference Manual (802.11a/g) Table 2-1. Network Authentication Types Typea Description WPA2-PSKWPA2 is a later version of WPA. WPA-PSK and WPA2-PSK Only select this if all clients support WPA2. If selected, you must use AES encryption and enter the WPA passphrase (Network key). This selection allows clients to use either WPA (with TKIP) or WPA2 (with AES). If selected, you must use TKIP + AES encryption and enter the WPA passphrase (Network key). a. All options are available if using the default Access Point mode. In other modes (for example, Repeater or Bridge) some options may be unavailable. • Data Encryption. The available options depend on the Network Authentication setting selected (see Table 2-1 above); otherwise, the default is None. The Data Encryption settings are explained in the table below: Table 2-2. Data Encryption Settings Data Encryption Type Description None 64 bits WEP 128 bits WEP 152 bits WEP TKIP AES TKIP + AES No encryption is used. Standard WEP encryption, using 40/64 bit encryption. Standard WEP encryption, using 104/128 bit encryption. Proprietary mode that will only work with other wireless devices that support this mode. This is the standard encryption method used with WPA. This is the standard encryption method for WPA2. This setting supports both WPA and WPA2. Broadcast packets use TKIP. For unicast (point-to-point) transmissions, WPA clients use TKIP, and WPA2 clients use AES. • Use of Passphrases and Keys are explained below: - Passphrase. To use the Passphrase to generate the WEP keys, enter a passphrase and click the Generate Keys button. You can also enter the keys directly. These keys must match the other wireless stations. - Key 1, Key 2, Key 3, Key 4. If using WEP, select the key to be used as the default key. Data transmissions are always encrypted using the default key. The other keys can only be used to decrypt received data. Basic Installation and Configuration v2.0, September 2006 2-21