Hitron CGN2 User Manual page 91

Residential cable modem
Table of Contents

Advertisement

Table 27:
The Wireless > Setup Screen (continued)
WEP Key Length
WEP Key 1~4
Default WEP Key
Authentication
91
91
HITRON CGN2 USER'S GUIDE
Use this field to specify the length of the security key
used to allow wireless devices to join the network. The
longer the key, the more secure it is.
Select 64-bit to use a ten-digit security key.

Select 128-bit to use a twenty-six-digit security key.

Use these fields to define the security keys that all
wireless devices on the network must use to join the
network.
The CGN2 supports up to four WEP keys, of which you
can select one as the default. You should input the
same four keys, in the same order, in your network's
wireless clients. Your CGN2 and your wireless clients
can use different default keys, as long as all four keys
are present and in the same order. If your wireless client
supports only a single WEP key, use the CGN2's default
key.
Enter the keys in hexadecimal format (using the digits
0~9 and the letters A~F).
Select the number of the security key that you want the
CGN2 to use as its default authentication key for
transmissions.
Select the authentication mode that you want to use:
Select Open System to allow wireless clients to

authenticate (identify themselves) to the CGN2
before presenting their security credentials (WEP
keys).
Select Shared Key to use the WEP key in the

authentication process. When a client wants to
associate, the CGN2 sends an unencrypted
challenge message. The client must use the WEP
key to encrypt the challenge message and return it to
the CGN2, which then decrypts the message and
compares the result with its original message.
Open System authentication is the more secure of the
two authentication types, since while the Shared Key
system appears more robust, it is possible to derive
secure data by capturing the challenge messages.
Select Automatic to have the CGN2 choose the

authentication method.
Version 2.0, February 2012. Copyright
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
2012 Hitron Technologies

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents