SMC Networks SMCWEB-N Network Card User Manual


 
11
Example:
64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 characters for
64-bit encryption.)
128-bit hexadecimal keys are exactly 26 characters in length. (456FBCDF123400122225271730 is a valid
string of 26 characters for 128-bit encryption.)
64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit
encryption.)
128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for
128-bit encryption.)
Note that, if you enter fewer characters in the WEP key than required, the remainder of the key is
automatically padded with zeros.
WPA-Personal and WPA-Enterprise
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by
the Wi-Fi Alliance. The WPA Mode further refines the variant that the access point should employ.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the access point
only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security
standard. With the "WPA2" option, the access point tries WPA2 first, but falls back to WPA if the client only
supports WPA. With the "WPA2 Only" option, the access point associates only with clients that also support
WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity
Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is
a very secure block based encryption. With the "TKIP and AES" option, the access point negotiates the cipher
type with the client, and uses AES when available.
Group Key Update Interval: The amount of time before the group key used for broadcast and multicast data
is changed.
WPA-Personal
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII
(American Standard Code for Information Interchange) format at both ends of the wireless connection. It
cannot be shorter than eight characters, although for proper security it needs to be of ample length and should
not be a commonly known phrase. This phrase is used to generate session keys that are unique for each
wireless client.
Example:
Wireless Networking technology enables ubiquitous communication
WPA-Enterprise
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have
established the necessary credentials before attempting to authenticate to the Server through this Gateway.
Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate
users.
Authentication Timeout: Amount of time before a client will be required to re-authenticate.
RADIUS Server IP Address: The IP address of the authentication server.
RADIUS Server Port: The port number used to connect to the authentication server.
RADIUS Server Shared Secret: A pass-phrase that must match with the authentication server.
MAC Address Authentication: If this is selected, the user must connect from the same computer whenever
logging into the wireless network.
Advanced: