Siemens SCALANCE W788-1PRO Operating Instructions Manual page 86

Hide thumbs Also See for SCALANCE W788-1PRO:
Table of Contents

Advertisement

Encryption
Encryption protects the transferred data from eavesdropping and corruption
can only disable encryption in the Encryption check box if you have selected Open
System for authentication in the Basic WLAN menu. All other security methods
include both authentication and encryption. Various schemes are used for
encryption:
WEP (Wired Equivalent Privacy)
A weak, symmetrical stre
keys based on the RC4 a
TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Ron's Code
4). In contrast to the weak WEP encryption, TKIP uses changing keys derived
from a main key. TKIP can also r
AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm
that further improves the functions of TKIP.
Encryption key source
The encryption key source indicates whether the key is configured locally and fixed
(local) or whether it is negotiated by a higher protocol and an authentication server
(server).
Security Level for WLAN list box
Select a security level that is supported by all clients. The content of the next page
depends on the selected security level. If you select the security level None, there
is no following page since neither encryption nor authentication will be used.
Operating Instructions SCALANCE W78x
C79000-G8976-C184-07
Configuration Using the Wizards of Web Based Management
am encryption method with only 40- or 104-bit long
lgorithm (Ron's Code 4).
ecognize corrupted packets.
. You
86

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalance w788-1rrScalance w788-2rrScalance w788-2pro

Table of Contents