Chapter Three
Operation
Page 29
© April 2007
Key values can be ignored.
These keys will be automatically generated by the System Generator
String - however the encryption keys can be manually changed. If
they are manually changed, you need to make the same change to
all modules in the system.
Each of the fields are 5 bytes in length for 64-bit encryption and 4
bytes for 128-bit AES encryption. These keys must be entered as
hexadecimal numbers separated by colons.
For example, 12:AB:EF:00:56. for 64bit encryption, and
12:AB:EF:00 for 128bit AES encryption
Encryption keys must not be all zeros, ie 00:00:00:00:00
64bit encryption uses each keys alternatively for each radio packet.
128bit AES encryption combines these keys to form a single 128bit
key, used on all radio packets.
Save and Reboot.
Save settings to non-volatile memory, and reboot 805U-E.
3.6
Ethernet Data
All Ethernet devices are uniquely identified by a MAC Address that identifies the hardware
device. These addresses are factory-set and are six bytes in size and are expressed in
hexadecimal in the form xx:xx:xx:xx:xx:xx
Ethernet messages can be addressed to a single device (a point-to-point message) or can be
directed towards multiple destinations by using Multicast addresses and Broadcast addresses.
The broadcast address is used to send data to all devices. The broadcast address is
FF:FF:FF:FF:FF:FF.
Multicast addresses are used to direct data at a set of devices. Multicast addresses may be
recognized as they are always have the least significant bit of the first byte of the MAC
Address set. For example, 01:00:5E:00:00:00 is a multicast address, 01:80:C2:00:00:00 is
also a multicast address.
3.7
Normal Operation
After addresses are configured, the units are ready for operation.
Refer to section 1 for an explanation on the operation of a Bridge and Router.
Transparent Bridge Operation
Bridges are typically used to connect sections of the same IP network together.
By default, the 805U-E is configured as a transparent bridge. When a transparent bridge is
started, it learns the location of other devices by monitoring the source address of all
incoming traffic. Initially it forwards all traffic between the wired Ethernet port and the
wireless port, however by keeping a list of devices heard on each port, the transparent bridge