Siemens SCALANCE W788-1PRO Operating Instructions Manual page 166

Hide thumbs Also See for SCALANCE W788-1PRO:
Table of Contents

Advertisement

Configuration Using Web Based Management and the Command Line Interface
E
ncryption Methods
If you have selected Open System including encryption or Shared Key as the
authentication, you will need to define a key in the Keys menu (see Section 6.4.2).
WEP (Wired Equivalent Privacy)
A weak, symmetrical stream encryption method with only 40- or 104-bit long
keys based on the RC4 alg
If you have selected WPA-PSK or WPA (RADIUS) as the authentication, the
following alternatives are available in the Cipher box:
TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Ron's Code
4). In contrast to the weak WEP encry
from a main key. TKIP can also recognize corrupted packets.
AE
S (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algori
that further improves the functions of TKIP.
Operating Instructions SCALANCE W78x
C79000-G8976-C184-07
orithm (Ron's Code 4).
ption, TKIP uses changing keys derived
thm
166

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalance w788-1rrScalance w788-2rrScalance w788-2pro

Table of Contents