Figure 6-6: Wireless - Wireless Security (Wpa-Personal); Figure 6-7: Wireless - Wireless Security (Wpa2-Personal) - Linksys SRW224P - 10/100 - Gigabit Switch User Manual

Business series wireless-g access point with power over ethernet and rangebooster
Hide thumbs Also See for SRW224P - 10/100 - Gigabit Switch:
Table of Contents

Advertisement

Wireless-G Access Point with Power Over Ethernet and Rangebooster
Default Transmit Key. Select the key to be used for data encryption.
WEP Encryption. Select a level of WEP encryption, 64 bits (10 hex digits) or 128 bits (26 hex digits).
Passphrase. If you want to generate WEP keys using a Passphrase, then enter the Passphrase in the field
provided and click the Generate key. Those auto-generated keys are not as strong as manual WEP keys.
Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of
the letters "A" through "F" and the numbers "0" through "9". It should be 10 characters in length for 64-bit
encryption or 26 characters in length for 128-bit encryption.
Change these settings as described here and click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes. Help information is available on the right side of the screen.
WPA-Personal (aka WPA-PSK)
WPA Algorithm. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of
algorithm you want to use, TKIP or AES. The default is TKIP.
WPA Shared Key. Enter a WPA Shared Key of 8-63 characters.

Figure 6-6: Wireless - Wireless Security (WPA-Personal)

Key Renewal Timeout. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is 3600 seconds.
WPA2-Personal
WPA Algorithm. WPA2 always uses AES for data encryption.
WPA Shared Key. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is 3600 seconds.

Figure 6-7: Wireless - Wireless Security (WPA2-Personal)

20
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Security Tab

Advertisement

Table of Contents
loading

Table of Contents