Ericsson W2x Series Network Card User Manual


 
24 221 02-FGB 101 327 Uen C - December 2006
6 Wireless LAN (WLAN)
6.1 SSIDs
The W2x terminals support single SSID. This SSID and a unique MAC
address are broadcasted in the beacon at regular intervals.
The SSID name can be set (changed) with a maximum length of 32
alphanumeric characters. It is also possible to configure the SSID to be
hidden.
The SSID can be either “open” (no authentication or encryption) or “closed”
(meaning either WEP or WPA security). See below for security details.
6.2 Wireless Security
Authentication and data encryption are used to restrict access to the
wireless network. Which authentication and encryption method that should
be used depends on what is supported by the connecting wireless
device(s).
The W2x terminals support the following WLAN security protocols:
WEP with both 64- and 128-bit key lengths.
WPA-PSK
WPA2-PSK
6.2.1 WEP
WEP enables wireless security using 64-bit or 128-bit data encryption.
WEP encryption requires a private network key. Each device in the wireless
network has to be manually configured with this key.
6.2.2 WPA / WPA2
WPA is a 256-bit data encryption method with keys that dynamically
change over time. WPA and its successor WPA 2 are considered to be the
most reliable security options.
For user authentication WPA/WPA2 runs a special, easy-to-set-up home
mode called Pre-Shared Key (PSK) where keys and passphrases are
manually entered.
WPA encryption uses the Temporal Key Integrity Protocol (TKIP) while
WPA2 encryption follows the Advanced Encryption Standard (AES).
6.2.3 Whitelist
A common method of restricting WLAN network access is to specify the
MAC address(es) in a so called “whitelist” for those computers access are
granted. Up to 20 MAC addresses for wireless clients can be added to the
whitelist. This feature does not require any configuration of the clients but
on the other hand it does not encrypt the traffic like WEP/WPA.