![Axis Network video Manual Download Page 89](http://html1.mh-extra.com/html/axis/network-video/network-video_manual_3038725089.webp)
89
10.2.1 WEP (Wired Equivalent Privacy)
WEP prevents people without the correct key from accessing the network. There are, however,
weaknesses in WEP. They include keys that are relatively short and other flaws that allow keys
to be reconstructed from a relatively small amount of intercepted traffic. WEP today is no longer
considered to provide adequate security as there are a variety of utilities freely available on the
web that can be used to crack what is meant to be a secret WEP key.
10.2.2 WPA/WPA2 (WiFi Protected Access)
WPA significantly increases security by taking care of the shortcomings in the WEP standard.
WPA adds a standard way for distributing encrypted keys.
10.2.3 Recommendations
Some security guidelines when using wireless cameras for surveillance:
> Enable the user/password login in the cameras.
> Enable the encryption (HTTPS) in the wireless router/cameras. This should be done before the
keys or credentials are set for the WLAN to prevent unauthorized access to the network with
stolen credentials.
> Ensure that wireless cameras support security protocols such as IEEE 802.1X and WPA/WPA2.
10.3 Wireless bridges
Some solutions may use other standards than the dominating IEEE 802.11, providing increased
performance and much longer distances in combination with very high security. Two commonly
used technologies are microwave and laser, which can be used to connect buildings or sites with
a point-to-point high-speed data link.
WIRELESS TECHNOLOGIES - CHAPTER 10