format is provided so you can enter a string that is easier to remember. The
ASCII string is converted to HEX for use over the network. Four keys can be
defined so that you can change keys easily. A default key is selected for use on
the network.
WPA (Wi-Fi Protected Access) was designed to improve upon the security
features of WEP (Wired Equivalent Privacy). The technology is designed to
work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol
(TKIP), which scrambles the keys using a hashing algorithm and by adding an
integrity checking feature which makes sure that keys haven't been tampered
with.
WPA Type: The encryption algorithm used to secure the data communication.
TKIP (Temporal Key Integrity Protocol) provides per-packet key generation
and is based on WEP. AES. Use AES only. AES (Advanced Encryption
Standard) is a very secure block based encryption. Note that, if the bridge uses
the AES option, the bridge can associate with the access point only if the
access point is also set to use only AES. TKIP and AES. The bridge negotiates
the cipher type with the access point, and uses AES when available.
802.1x: Select true of false from the drop-down list to enable or disable
802.1x.
Click on the Save Changes button to store and changes and then reboot the
device in order for the changes to take effect.
3.3.2
Security > MAC access
MAC Access provides another level of security by filtering the packets coming into
the device. Figure 6.2.1 and Figure 6.2.2 illustrate the MAC Access configuration
page.
36