Avery Dennison MonarchNet2 9855 Operating Insructions page 108

Table of Contents

Advertisement

WEP or
Wired
Equivalent
Privacy
128 Bit / 64 Bit
WEP Key
WLAN or
Wireless Local
Area Netw ork
WPA (Wi-Fi
Protected
Access)
WPA2
(or IEEE 802.11i)
G-6 MonarchNet2 Operating Instructions
A security protocol for wireless local area networks. WEP was
designed to provide the same level of security as that of a
wired network, which is inherently more secure than a wireless
network because wired networks are easily protected against
unauthorized access. Wireless networks use radio waves to
communicate and can be vulnerable to unauthorized users.
WEP provides security by encrypting data over radio waves so
that it is protected as it is transmitted. However, it has been
found that WEP is not as secure as once believed.
Note: If one part of a wireless network has WEP enabled, they
all must have it enabled with the same key or they cannot
communicate.
This is the 64 or 128 bit WEP key that must match other
Nodes' encryption keys in order to communicate: 10 hex
characters for 64 bit (40 user-specified characters), or 26 hex
characters for 128 bit (104 user-specified characters). You
must use the same key values for devices to communicate with
each other.
A LAN that uses high-frequency radio waves to communicate
between nodes, rather than telephone wires, etc.
A network security protocol that uses improved authentication
and temporal keys. It was created to address the weaknesses
of WEP encryption.
A network security protocol with stronger encryption than WPA.
It was created to address the weaknesses of WEP encryption.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Monarchnet2 9860Monarch 9855Monarch 9860

Table of Contents