![Airaya AI108-4958-1 Скачать руководство пользователя страница 32](http://html1.mh-extra.com/html/airaya/ai108-4958-1/ai108-4958-1_manual-and-installation-manual_2875973032.webp)
- 32 -
Airaya
– Fast and affordable outdoor wireless bridges
Data Encryption
Encryption Type
–
WirelessGRID bridges support three types of
encryption.
Default: Auto.
WEP
–
Wired Equivalent Privacy (WEP) data encryption (64, 128, or 152
bit key lengths can be registered). The 64 bit keys must be entered as
10 hexadecimal digits in the range of 0-9, A-F, or a-f. If 128 bit is
chosen, enter 26 hexadecimal digits. If 152 bit is chosen, enter 32
digits.
AES/WPA2
–
Advanced Encryption Standard (AES) data encryption is
the most robust data encryption in the market today. It was designed to
comply with U.S. requirements [Federal Information Processing
Standard (FIPS)] for use by U.S. government organizations to protect
sensitive, unclassified information. The WirelessGRID supports 128 bit
AES keys. Enter 26 hexadecimal digits.
TKIP
–
Temporal Key Integrity Protocol (TKIP) is a WPA security
standard that uses the original encryption key as a starting point to
derive encryption keys mathematically. TKIP automatically changes and
rotates encryption keys so that the same encryption key is never used
twice. This is an automated encryption key switching process that does
not require user intervention.
Status
–
The status button indicates the current encryption state of your
bridge.
Default: Disabled.
Disabled
–
No data encryption is enforced on your bridge.
Enabled
–
Data encryption is enforced on your bridge.
Key Update Interval –
Specifies the group key update interval in
seconds. The value is only used with dynamic keys and can be either 0
(disabled) or any value above 15.
Default: 0.
Security Server
–
For use with dynamic keys utilizing 802.1x security.
Click on
Configure
to set up the
Security Server
if dynamic (802.1x)
encryption is selected for the bridge on the security screen.
NOTE
This function in not supported in the current release. Refer to the section on
the
Security Server tab
for detailed instructions on how to configure the
Security Server.