Configuration Using Web Based Management and the Command Line Interface
E
ncryption Methods
If you have selected Open System including encryption or Shared Key as the
authentication, you will need to define a key in the Keys menu (see Section 6.4.2).
●
WEP (Wired Equivalent Privacy)
A weak, symmetrical stream encryption method with only 40- or 104-bit long
keys based on the RC4 alg
If you have selected WPA-PSK or WPA (RADIUS) as the authentication, the
following alternatives are available in the Cipher box:
●
TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Ron's Code
4). In contrast to the weak WEP encry
from a main key. TKIP can also recognize corrupted packets.
●
AE
S (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algori
that further improves the functions of TKIP.
Operating Instructions SCALANCE W78x
C79000-G8976-C184-07
orithm (Ron's Code 4).
ption, TKIP uses changing keys derived
thm
166