TRENDnet TEW-P11G User's Guide - Page 53

Network Type, Ad-hoc, Infrastructure, Security, Disabled, WPA-PSK, WPA2-PSK, Authentication, Bits/ - wireless wpa2

Page 53 highlights

Network Type Security WEP Authentication 64 Bits/128Bits Key Table Default Key Select the correct value for your Wireless LAN. • Ad-hoc mode is used when there is no Wireless Access Point, and each Wireless station communicates directly with other Wireless stations. This is the older standard. • Infrastructure mode is used when each Wireless station connects to the Wireless Access point. This also provides access to the wired LAN. • Disabled - no data encryption is used. • WEP - data is encrypted using the WEP standard. • WPA-PSK - data is encrypted using the WPA-PSK standard. This is a later standard than WEP, and provides much better security than WEP. • WPA2-PSK -this is a further development of WPA-PSK, and offers even greater security. Options are "Open System" or "Shared Key". Select the method (Open System or Shared Key) used by other Wireless Stations. Shared Key is more secure than Open System. Select "64Bits" or "128Bits" as required to match other Wireless stations on your WLAN. Stations which do not have matching settings will be unable to communicate. 128 bit Keys are more secure than 64 bit Keys. Enter the key values to match other Wireless stations on your WLAN. This table is used when Encrypting and Decrypting data. All stations always transmit data encrypted using their default key (see below). The key number (1, 2, 3, 4) is also transmitted. The receiving station will use the key number (1, 2, 3, 4) to determine which key value to use for decryption. If the key value does not match the transmitting station, decryption will fail. The easiest way to ensure there are no problems is to have every Station, including the Access Point, use the same key table (all entries identical). Then, it does not matter which key is used as the default key. Select the key you wish to be the default. Transmitted data is ALWAYS encrypted using the Default Key; the other Keys are for decryption only. Page 50

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

Page 50
Network Type
Select the correct value for your Wireless LAN.
Ad-hoc
mode is used when there is no Wireless Access Point, and
each Wireless station communicates directly with other Wireless
stations. This is the older standard.
Infrastructure
mode is used when each Wireless station connects
to the Wireless Access point. This also provides access to the
wired LAN.
Security
Disabled
- no data encryption is used.
WEP
- data is encrypted using the WEP standard.
WPA-PSK
- data is encrypted using the WPA-PSK standard.
This is a later standard than WEP, and provides much better
security than WEP.
WPA2-PSK
-this is a further development of WPA-PSK, and
offers even greater security.
WEP
Authentication
Options are "Open System" or "Shared Key".
Select the method (Open System or Shared Key) used by other
Wireless Stations.
Shared Key is more secure than Open System.
64 Bits/128Bits
Select "64Bits" or "128Bits" as required to match other Wireless
stations on your WLAN. Stations which do not have matching settings
will be unable to communicate.
128 bit Keys are more secure than 64 bit Keys.
Key Table
Enter the key values to match other Wireless stations on your WLAN.
This table is used when Encrypting and Decrypting data. All stations
always transmit data encrypted using their default key (see below).
The key number (1, 2, 3, 4) is also transmitted. The receiving station
will use the key number (1, 2, 3, 4) to determine which key value to
use for decryption. If the key value does not match the transmitting
station, decryption will fail.
The easiest way to ensure there are no problems is to have every
Station, including the Access Point, use the same key table (all entries
identical). Then, it does not matter which key is used as the default
key.
Default Key
Select the key you wish to be the default. Transmitted data is
ALWAYS encrypted using the Default Key; the other Keys are for
decryption only.