Siemens SCALANCE W1780 Configuration Manual page 309

Industrial wireless lan
Table of Contents

Advertisement

– WPA/WPA2-Auto-PSK
– WPA/WPA2-Auto
● Encryption
Encryption protects the transferred data from eavesdropping and corruption. You can only
disable encryption if you have selected "Open System" for authentication. All other security
methods include both authentication and encryption.
● Cipher
Select the encryption method. The selection depends on the transmission standard.
– AUTO
– WEP
– TKIP (Temporal Key Integrity Protocol)
– AES (Advanced Encryption Standard)
● WPA(2) Pass Phrase
Enter a WPA(2) key here. This WPA(2) key must be known on both the client and the access
point and is entered by the user at both ends.
– For a key with 8 to 63 characters, you can only use the following readable ASCII
– For a key with precisely 64 characters, you can use the following ASCII characters: 0 -
● WPA(2) Pass Phrase Confirmation
Confirm the entered WPA(2) pass phrase.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-03
Setting with which an access point can process both the "WPA-PSK" and the "WPA2-
PSK" type of authentication. This is necessary when the access point communicates
with different clients, some using "WPA-PSK" and others "WPA2-PSK". The same
encryption method is set on the clients.
Setting with which an access point can process both the "WPA" and the "WPA2" type of
authentication. This is necessary when the access point communicates with different
clients, some using "WPA" and others "WPA2". The same encryption method is used on
the clients
Either AES or TKIP is automatically selected, depending on the capability of the other
station.
WEP (Wired Equivalent Privacy)
A symmetrical stream encryption method with only 40-bit or 104-bit keys based on the
RC4 (Ron's Code 4) algorithm.
A symmetrical stream encryption method with the RC4 (Ron's Code 4) algorithm. In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted data frames.
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
Note
To provide better protection of your data against attacks, use WPA2/ WPA2-PSK with
AES.
characters: 0x20 - 0x7e.
9, a - f and A - F.
Configuring with Web Based Management
6.10 "Security" menu
309

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalance w1740Scalance w1780 seriesScalance w1740 seriesScalance w1788-2 m12 eecScalance w1788-1 m12Scalance w1788-2 m12 ... Show all

Table of Contents