
51
Wireless Tabs
Corinex Wireless to Powerline AP
Key Table
This table is used during encryption and decryption of data. All stations,
including this Access Point, always transmit encrypted data using their
default key. The key number (1, 2, 3, 4) is also transmitted. The receiving
station will use the key number (1, 2, 3, 4) to determine which key value to
use for decryption. If the key value does not match the transmitting station,
decryption will fail. The easiest way to ensure there are no problems is to
let every Station, including the Access Point, to use the same key table (all
entries identical).
Key 1 – Key 4.
WEP keys enable you to create an encryption scheme for wireless LAN
transmissions. Manually enter a set of values. (Do not leave the field blank)
If you use 64-bit WEP encryption, then each key must consist of exactly 10
hexadecimal characters in length. If you use 128-bit WEP encryption, then
each key must consist of exactly 26 hexadecimal characters in length. Valid
hexadecimal characters are "0"-"9" and "A"-"F".
Encryption Key 1
Secret key 1 of WEP security encryption function.
Encryption Key 2
Secret key 2 of WEP security encryption function.
Encryption Key 3
Secret key 3 of WEP security encryption function.
Encryption Key 4
Secret key 4 of WEP security encryption function.
802.1x
Known as .1x, this is the key exchange standard used between a client and
Access Point for user’s authentication process. Configuration for a large
network is much easier since individual WEP settings for each client are
no longer required. In addition, access management is performed easily in
the RADIUS server environment, making this feature valuable for network
administration.
ReAuthEnabled
You may choose between
True
or
False.
The encryption Type default is set
to
False.
ReAuthPeriod
In this field you can set the
encryption
period. Value can be 5 digits of
alphanumeric characters. When a client requests a communication with
Access Point, the
Corinex Wireless to Powerline Access Point
reports its
own MAC address to the RADIUS server and asks for communication
approval to the client. Once the client is recognized by RADIUS, the RADIUS
issues a key to the Access Point as well as to the client for initiation of
communication.