Wep; Wpa-Psk; Wireless Lan Configuration - LevelOne WBR-6000 User Manual

N_one wireless broadband router
Hide thumbs Also See for WBR-6000:
Table of Contents

Advertisement

N_One Wireless Broadband Router
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for
an Access Point. If more than one Access Point can be used, the one with the
strongest signal is used. (This can only happen within an ESS.)
If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to
use the same Channel. However, most Wireless stations will still scan all Chan-
nels to see if there is an existing "Ad-hoc" group they can join.

WEP

WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is transmit-
ted.
This is desirable because it is impossible to prevent snoopers from receiving any data
which is transmitted by your Wireless Stations. But if the data is encrypted, then it is
meaningless unless the receiver can decrypt it.
If WEP is used, the Wireless Stations and the Access Point must have the same
settings for each of the following:
WEP
Key
WEP Authentication

WPA-PSK

WPA-PSK is another standard for encrypting data before it is transmitted. This is a
later standard than WEP (Wired Equivalent Privacy), and provides greater security for
your data. Data is encrypted using a key which is automatically generated and
changed often.
If all your Wireless stations support WPA-PSK, you should use this instead of WEP.
If WPA-PSK is used, the Wireless Stations and the Access Point must have the
same settings for each of the following:
WPA PSK
(Pre-shared Key)
Encryption

Wireless LAN Configuration

To allow Wireless Stations to use the Access Point, the Wireless Stations and the
Access Point must use the same settings, as follows:
Mode
Off, 64 Bit, 128 Bit
For 64 Bit encryption, the Key value must match.
For 128 Bit encryption, the Key value must match
Open System or Shared Key.
Enter the same value on every station and the AP.
The PSK must be from 8 to 63 characters in length.
The key used for the actual encryption is derived from
this key.
The same encryption method must be used. The most
common encryption method is TKIP. Another widely-
supported method is AES.
On client Wireless Stations, the mode must be set to "Infrastruc-
ture".
87

Advertisement

Table of Contents
loading

Table of Contents