![Ubiquiti AirRouterHP User Manual Download Page 19](http://html1.mh-extra.com/html/ubiquiti/airrouterhp/airrouterhp_user-manual_3199619019.webp)
15
Chapter 5: Wireless Tab
AirRouter
HP User Guide
Ubiquiti Networks, Inc.
Automatic
When selected, the rate algorithm will select
the best data rate, depending on link quality conditions.
It is recommended that you use this option, especially if
you are having trouble getting connected or losing data
at a higher rate. Refer to the Advanced section for detailed
information about rate algorithms.
Wireless Security
In Access Point and Access Point WDS mode, this is where
you configure the wireless security settings that will be
used by the devices on your wireless network.
In Station or Station WDS mode, you will need to match
the security settings of the Access Point that the AirRouter
HP is associated with.
Security
The AirRouter HP supports the following
wireless security methods:
•
None
Creates an open network without any security.
•
WEP
WEP (Wired Equivalent Privacy) is the oldest and
least secure security algorithm. WPA™/WPA2™ security
methods should be used when possible.
•
WPA
WPA™ or Wi-Fi Protected Access was developed as
a stronger encryption method over WEP.
•
WPA-TKIP
WPA™ (Wi-Fi Protected Access) security
mode with TKIP support only. TKIP (Temporal Key
Integrity Protocol) uses the RC4 encryption algorithm.
•
WPA-AES
WPA™ (Wi-Fi Protected Access) security
mode with AES support only. AES (also known as CCMP)
- Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol which uses the Advanced
Encryption Standard (AES) algorithm.
•
WPA2
WPA2™ was developed to strengthen wireless
encryption security and is stronger than WEP and
WPA™.
•
WPA2-TKIP
WPA2™ (Wi-Fi Protected Access) security
mode with TKIP support only. Temporal Key Integrity
Protocol which uses RC4 encryption algorithm.
•
WPA2-AES
WPA2™ (Wi-Fi Protected Access) security
mode with AES support only. AES (also known as
CCMP) - Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol which uses the
Advanced Encryption Standard (AES) algorithm. This
is the strongest security option available. If all of the
wireless devices on your network support this option, it
is recommended that you select it.
WEP
Authentication Type
One of the following authentication
methods should be selected if WEP security is used:
•
Open
The station is authenticated automatically by the
AP (selected by default).
•
Shared Key
Station is authenticated after the
challenge, generated by the AP.
WEP Key Length
This determines the length of the WEP
security key. Select one of the two key length options:
•
64-bit
This option is selected by default. A 64-bit key is
10 HEX or 5 ASCII characters in length.
•
128-bit
The 128-bit option provides a little more
security and is 26 HEX or 13 ASCII characters in length.
Key Type
Specifies the character format for the WEP key:
•
HEX
Selected by default, this option uses hexadecimal
characters. 0-9, A-F or a-f are valid characters.
•
ASCII
ASCII uses the standard English alphabet and
numeric characters.
WEP Key
Enter the WEP encryption key adhering to the
selections you made for key length and key type:
Type
HEX
ASCII
64-bit
10 Hexadecimal Characters
(0-9, A-F or a-f) Example:
00112233AA
5 ASCII Characters
Example:
ubnt1
128-bit
26 Hexadecimal Characters
(0-9, A-F or a-f) Example:
00112233445566778899AABBCC
13 ASCI characters
Example:
ubntproducts1
Key Index
Specifies the Index of the WEP Key used. 4
different WEP keys can be configured at the same time,
but only one is used. The effective key is set by choosing 1,
2, 3 or 4.
Summary of Contents for AirRouterHP
Page 1: ......