BinTec RS353j User Manual page 167

Rs series
Hide thumbs Also See for RS353j:
Table of Contents

Advertisement

bintec elmeg GmbH
bintec RS Series
fers the highest level of security, but this security mode is only really suitable for compan-
ies, because it requires a central authentication server. Private users should choose WEP
or preferably WPA-PSK with higher security as their security mode.
WEP
802.11 defines the security standard WEP (Wired Equivalent Privacy = encryption of data
with 40 bit (Security Mode =
this widely used WEP has proven susceptible to failure. However, a higher degree of se-
curity can only be achieved through hardware-based encryption which required additional
configuration (for example 3DES or AES). This permits even sensitive data from being
transferred via a radio path without fear of it being stolen.
IEEE 802.11i
Standard IEEE 802.11i for wireless systems contains basic security specifications for wire-
less networks, in particular with regard to encryption. It replaces the insecure WEP (Wired
Equivalent Privacy) with WPA (Wi-Fi Protected Access). It also includes the use of the ad-
vanced encryption standard (AES) to encrypt data.
WPA
WPA (Wi-Fi Protected Access) offers additional privacy by means of dynamic keys based
on the Temporal Key Integrity Protocol (TKIP), and offers PSK (preshared keys) or Extens-
ible Authentication Protocol (EAP) via 802.1x (e.g. RADIUS) for user authentication.
Authentication using EAP is usually used in large wireless LAN installations, as an authen-
tication instance in the form of a server (e.g. a RADIUS server) is used in these cases. PSK
(preshared keys) are usually used in smaller networks, such as those seen in SoHo (Small
office, Home office). Therefore, all the wireless LAN subscribers must know the PSK, be-
cause it is used to generate the session key.
WPA 2
The enhancement of WPA is WPA 2 . In WPA 2 , the 802.11i standard is not only imple-
mented for the first time in full, but another encryption algorithm AES (Advanced Encryption
Standard) is also used.
Access control
You can control which clients can access your wireless LAN via your device by creating an
Access Control List (Access Control oder MAC-Filter). In the Access Control List, you
enter the MAC addresses of the clients that may access your wireless LAN. All other clients
have no access.
) or 104 bit (Security Mode =
10 Wireless LAN
). However,
153

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rs353j-4gRs353jw

Table of Contents