THOMSON Gateway Configuration Manual page 79

Wireless configuration guide
Hide thumbs Also See for Gateway:
Table of Contents

Advertisement

Chapter 7
Thomson Gateway Wireless Configuration
WEP
The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from being
eavesdropped.
WEP relies on a secret key that is shared between the wireless station (e.g. a laptop with a wireless ethernet
card) and the Thomson Gateway. The fixed secret key is used to encrypt packets before they are transmitted.
I.e. during transmission between station and AP ("in the air"), the information in the packets is encrypted.
To enable level1 - WEP:
1
Select Security Level 1 - WEP.
2
In the Type list, click the desired Data Security level (either 64-bit or 128-bit and Alphanumeric or
Hexadecimal).
3
In the Encryption key box, type a Network key of your choice. In case of:
64 bits, Alphanumeric:
The 40-bits Network key must consist of 5 alphanumeric characters.
64 bits, Hexadecimal:
The 40-bits Network key must consist of 10 hexadecimal digits.
128 bits, Alphanumeric:
The 104-bits Network key must consist of 13 alphanumeric characters.
128 bits, Hexadecimal:
The 104-bits Network key must consist of 26 hexadecimal digits.
4
Click Apply to immediately apply your changes.
5
Configure your wireless station(s) with the same settings.
WPA-PSK
The Thomson Gateway supports WPA-PSK which has 3 improvements on WEP:
>
Authentication via a 4-way handshake to check whether the Pre-Shared Keys (PSKs) are the same.
>
Stronger encryption types:
Temporal Key Integrity Protocol (TKIP) (default): Instead of using a fixed WEP key, TKIP uses
temporary session keys in pairs. These keys are derived from the PSK during the 4-way handshake.
For each packet it uses a different key. TKIP also provides a message integrity check (MIC) and a
rekeying mechanism (in seconds).
Advanced Encryption Standard (AES): State-of-the-art encryption; can only be used if all wireless
devices in your WLAN support AES.
>
Message Integrity Check (MIC): a strong mathematical function in which the recipient and transmitter
each compute and compare the MIC. If they don't match, it is assumed that a third person has been trying
to read the data.
E-DOC-CTC-20060609-0001 v2.0
73

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents