D-Link DI-624S Network Router User Manual


 
16
Open System/Shared Key
The Open System/Shared Key choice for Authentication will produce the same screen for the
user’s configuration. The Open System choice is for general use and utilizes the basic WEP
encryption. The Shared Key choice is used between cooperating devices that share a common
encryption key. WEP (Wireless Encryption Protocol or Wired Equivalent Privacy) encryption can
be enabled for security and privacy. WEP encrypts the data portion of each frame transmitted
from the wireless adapter using one of the predefined keys. Decryption of the data contained in
each packet can only be done if the both the receiver and transmitter have the correct shared key.
WEP – Click the Enabled radio button to employ WEP encryption on the router.
WEP Encryption - Use the drop down menu to select the type of WEP encryption. Select 64 Bit
to enabled 64 bit Hexadecimal encryption, 128 Bit to enable 128 bit Hexadecimal encryption. For
64-bit encryption, the (ASCII) characters are converted automatically and listed as 10-digit
hexadecimal keys. 64-bit encryption allows you to select one of four active keys. For 128-bit
encryption, the characters are converted and listed as a 26 digit hexadecimal key. 128-bit
encryption allows you to select one of four active keys. 128-bit keys are to be from 5-13 inputted
characters in length and 256-bit keys must be from 10-26 inputted characters in length. Failing to
have the same key on the server and its clients will result in the clients not receiving any
information from the router or its connected devices.
Key Type – Use the pull-down menu to select the type of Key to be used for encryption. The user
may choose HEX (Hexidecimal) or ASCII (American Standard Code for Information Interchange).
Both will require the user to enter a key in the following field.
Key – The user may enter up to four keys to be used for encryption. Only the key selected using
the corresponding radio button will be used for encryption.
Click Apply to set the information in the router’s memory.
(Note: For the client implementation
of this function, please see the user manual for the associated client PC)