Bewan Wi-Fi USB 54
21
Configuring encryption
One of the major aspects of the wireless network is its security. For obvious reasons, wireless
connections are easy to intercept. Data encryption helps to ensure the security of data transmissions.
WEP encryption
With WEP (
Wired Equivalent Privacy
), a user identification mechanism, you can ensure the
security of data transmission between the client station and an Access Point (or router) or other
client stations, using an encryption key. Without encryption, anyone within the network coverage
zone can intercept and decode frames sent to other parties.
The aim of WEP encryption is to provide confidentiality of data, equivalent, if not superior, to
wired networks, and thus optimise reliability in the transmission of data packets. To configure and
activate WEP, you should proceed as follows:
1.
In the
Authentication Mode
section, select the configuration options in order to verify the
identity and access privileges of mobile network cards. This consists of validating a user or
system, prior to communication. It is possible to choose between
Open System
or
Shared Key
.
•
Open System
: Open system identification is the simplest identification algorithm available.
It is an algorithm which requires no identification. Any station requesting identification with
this algorithm will be accepted if the type of identification on the receiver station is set to
receive open system identification. This identification allows any wireless devices to
communicate with each other.
•
Shared Key
: Shared Key identification uses the WEP network key to identify the remote
Wireless device. If the remote device uses an incorrect key, or no key, the user is denied
access. Shared Key identification prevents unauthorised devices from connecting to your
equipment.
2.
Click on
Next
.
Summary of Contents for Wi-Fi USB 54
Page 1: ......