WEP is the wireless LAN security technology
specified by IEEE802.11. It applies encryption to
communications to prevent outsiders from
intercepting communications or intruding into
your wireless network. There are two types of
encryption key length: 64-bit key and 128-bit key.
The 128-bit encryption key assures a higher
security level. Because many wireless devices
support WEP conventionally, WEP has high
compatibility. However, a decryption technique
exists, so using the same encryption key for an
extended period of time is not recommended.
TKIP is a security technology developed to
correct for the deficiencies of WEP.
AES is a security technology which uses an
advanced encryption method that is distinct from
WEP and TKIP. AES assures a higher security
level than WEP or TKIP.
About Wireless LAN Security
settings of the Base Station
Access Point mode
The security for wireless LAN communication is
set to [WEP] at the time of purchase. To increase
the security level, switching to [WPA-PSK
(TKIP)] or [WPA2-PSK (AES)] is
recommended, depending on the security
technology supported by your wireless device.
You need to set the option in accordance with the
settings of the wireless LAN to which you want
You can select whether to permit or deny access
to the [Base Station Setting] page from a device
that has a global IP address.
Usually, only devices that are in the same LAN
and have a private IP address can access the [Base
Station Settings] page. However, some routers
allow you to assign a global IP address to a
device, and if you do so, the device cannot access
the [Base Station Settings] page. If you want to
access the [Base Station Settings] page from a
device with a global IP address, you need to make
access control settings as follows.
1 Select this if you want to permit access from
only devices that have a private IP address.
2 Select this if you want to permit access from
devices that have a global IP address.
3 Click this to save changes.
• When security is provided from the Internet side
(WAN side), make sure it also covers this port 80,
such as by means of a firewall function on the
• If security is not provided by the router, there is a
risk that the Base Station may be accessed via port
80 by an intruder on the Internet (WAN) side. To
ensure the security of the Base Station, refer to
"Changing the Password" (1 page 31), and change
the password periodically to prevent an intruder
from logging in to the [Base Station Settings]
• If an intruder accesses and logs in to the [Base
Station Settings] page, the following dangers
- The Base Station settings may be changed.