Advantek Networks AWN-MIMO-54RA Network Card User Manual


 
27
Encryption Mode:
None – Disable the Encryption mode.
WEP – Enabled the WEP Data Encryption. When the item is selected, you have to
continue setting the WEP Key Length & the key Index.
TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10000
packets (a packet is a kind of message transmitted over a network). This insures much
greater security than the standard WEP security.
AES – AES has been developed to ensure the highest degree of security and
authenticity for digital information and it is the most advanced solution defined by IEEE
802.11i for the security in the wireless network.
Note: All devices in the network should use the same encryption method to ensure the
communication.
WPA Pre-Shared Key: The WPA-PSK key can be from 8 to 64 characters and can be letters
or numbers. This same key must be used on all of the wireless stations in the network.
WEP Key (Key1~Key4): The WEP keys are used to encrypt data transmitted in the wireless
network. There are two types of key length: 64-bit & 128-bit. Select the default encryption key
form key1 to key4 by selected the radio button.
Fill the text box by following the rule below:
64-bit – Input 10-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 5-digit ASCII
characters (including “a-z” and “0-9”) as the encryption keys. For example: “0123456aef
or “test1
128-bit – Input 26-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 13-digit ASCII
characters (including “a-z” and “0-9”) as the encryption keys. For example:
01234567890123456789abcdef” or “administrator
3.3.3 802.1x Setting-Certification
The IEEE 802.1X specification describes a protocol that can be used for authenticating
both clients and servers on a network. The authentication algorithms and methods are those
provided by the Extensible Authentication Protocol (EAP), a method of authentication that has
been in use for a number of years on networks that provide Point-to-Point Protocol (PPP)
support as many Internet service providers and enterprises do.
When an AP acting as an authenticator detects a wireless station on the LAN, it sends an
EAP-Request for the user’s identity to the device. (EAP, or the Extensible Authentication
Protocol, is an authentication protocol that runs before network layer protocols transmit data
over the link) In turn, the device responds with its identity, and the AP relays this identity to an
authentication server, which is typically an external RADIUS server.