Cerio PS-200N-AX User Manual page 39

5ghz 11na 500mw 300mbps high power soho ap bridge
Table of Contents

Advertisement

 Key Length: The key size of WEP encryption can be 64bit, 128bit or 152bit.
 WEP auth method: You can select the appropriate value: Open system (If
enabling this mode, there is no need authentication to access AP or Wireless NIC)
or Shared (Only those who are sharing the same key with the AP can connect
with it).
 Key Index: You can select the Key which you want to use. Other wireless station
must have the same key value to connect with PS-200N-AX, 4 different WEP keys
can be configured at the same time, but only one is used. Effective key is set with
a choice of WEP Key 1, 2, 3 or 4.
 WEP Key #: You can chose either HEX or ASCII for your WEP key value, for 64bit
encryption strength can use 10 digits for HEX (0~9, a~f and A-F) or 5 digits for
ASCII (0~9, a~z and A~Z), for 128bit encryption strength can use 26 digits for
HEX (0~9, a~f and A-F) or 13 digits for ASCII (0~9, a~z and A~Z), for 152bit
encryption strength can use 32 digits for HEX (0~9, a~f and A-F) or 16 digits for
ASCII (0~9, a~z and A~Z)
WPA-PSK (or WPA2-PSK): WPA-PSK is short for W-Fi Protected
Access-Pre-Shared Key. WPA-SPK uses the same encryption way with WPA, and the
only difference between them is that WPA-PSK recreates a simple shared key, instead
of using the user's certification.
 Cipher Suite: You can chose use AES or TKIP with your WPA / WPA2 encryption
method,
AES is short for "Advanced Encryption Standard", The AES cipher is specified
as a number of repetitions of transformation rounds that convert the input plaintext
into the final output of ciphertext. Each round consists of several processing steps,
including one that depends on the encryption key. A set of reverse rounds are
applied to transform ciphertext back into the original plaintext using the same
encryption key.
TKIP is short for "Temporal Key Integrity Protocol", TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures
that the keys haven't been tampered with.
CERIO software core : cen_v3.0

Advertisement

Table of Contents
loading

Table of Contents