Teletronics International EzBridge 5800 User Manual page 20

Table of Contents

Advertisement

64-bit WEP with 10 hexadecimal digits
('0-9', 'A-F')
128 bit (26 Hex Digit)
WEP Key type
128-bit WEP with 13 characters
128-bit WEP with 26 hexadecimal digits
('0-9', 'A-F')
WEP Key 1 – 4
Follow the example above to setup either character or hexadecimal key according to the key length.
WEP key to use
Select one pre-defined WEP key to use for authentication.
Deny unencrypted data
When the WEP authentication is enabled any unencrypted data will be blocked from getting pass this unit from the
receiving side.
Shared key Authentication
Shared key authentication supports authentication of stations as either a member of those who know a shared secret
key or a member of those who do not. Shared key authentication is not secure and is not recommended for use. It
verifies that an authentication-initiating station has knowledge of a shared secret. This is similar to pre-shared key
authentication for Internet Protocol security (IPSec). The 802.11 standard currently assumes that the shared secret is
delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802.11.
In practice, a user manually types this secret for the wireless AP and the wireless client.
Shared key authentication uses the following process:
1. The authentication-initiating wireless client sends a frame consisting of an identity assertion and a request for
authentication.
2. The authenticating wireless node responds to the authentication-initiating wireless node with challenge text.
3. The authentication-initiating wireless node replies to the authenticating wireless node with the challenge text
that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret.
4. The authentication result is positive if the authenticating wireless node determines that the decrypted
challenge text matches the challenge text originally sent in the second frame. The authenticating wireless node
sends the authentication result.
Because the shared key authentication secret must be manually distributed and typed, this method of authentication
does not scale appropriately in large infrastructure network mode, such as corporate campuses.
Key1= 0x123456789A
Key2= 0x23456789AB
Key3= 0x3456789ABC
Key4= 0x456789ABCD
Example
Key1= 2e3f4w345ytre
Key2= 5y7jse8r4i038
Key3= 24fg70okx3fr7
Key4= 98jui2wss35u4
Key1= 0x112233445566778899AABBCDEF
Key2= 0x2233445566778899AABBCCDDEE
Key3= 0x3344556677889900AABBCCDDFF
Key4= 0x44556677889900AABBCCDDEEFF
*Hexadecimal digits have to preceded by '0x'

Advertisement

Table of Contents
loading

Related Products for Teletronics International EzBridge 5800

Table of Contents