Check Point UTM-1 Edge User Manual page 302

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

Configuring Wireless Networks
In this field...
Do this...
WPA Encryption
Select the encryption method to use for authenticating and encrypting
wireless data:
Note: AES is more secure than TKIP; however, some devices do not support
AES.
WEP Keys
If you selected WEP encryption, you must configure at least one WEP key.
The wireless stations must be configured with the same key, as well.
Key 1, 2, 3, 4 radio
Click the radio button next to the WEP key that this gateway should use for
button
transmission.
The selected key must be entered in the same key slot (1-4) on the station
devices, but the key need not be selected as the transmit key on the
stations.
Note: You can use all four keys to receive data.
Key 1, 2, 3, 4
Select the WEP key length from the drop-down list.
length
The possible key lengths are:
Note: Some wireless card vendors call these lengths 40/104/128,
respectively.
Note: WEP is generally considered to be insecure, regardless of the
selected key length.
288
Auto. The UTM-1 appliance automatically selects the cipher used
by the wireless client. This is the default.
AES. Advanced Encryption Standard
TKIP. Temporal Key Integrity Protocol
64 Bits. The key length is 10 characters.
128 Bits. The key length is 26 characters.
152 Bits. The key length is 32 characters.
Check Point UTM-1 Edge User Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF