background image

13

Authentication:

 Authentication is a process in which the identity, e.g. of a person is determined based on a certain characteristic. 

This can be done by fi ngerprint, password or any other proof of authorisation.

Encryption:

 Encryption is a process in which a plain text is transformed into a coded text via an encryption process (algorithm). One or 

more codes can be used for this.

It must also be mentioned that each individual encryption process offers one or more authentication options.

Now switch to the 

Advanced

 tab.

Wireless mode allows you to set the standard to be used. This depends on the other devices used in your network. You can choose 

either 

802.11 B only

 mode (11 Mbps): Then this standard only is used; or 

802.11 B/G mixed

 mode up to 54 Mbps): Both standards are 

then supported; If you are not sure which of the standards your devices support, you should use the mixed mode 

(802.11 B/G mixed 

mode)

. Make all other settings as shown in the image below.

Click 

Apply

 to confi rm your entries.

This device can be used with the following encryption types:

64 and 128 bit WEP encryption 

WPA Encryption

 

Note!!! Encryption is deactivated by default. 

 

However, for security reasons, we 

 

recommend that you always use encryption.

9.2.2.1 WEP encryption

Wired Equivalent Privacy 

(WEP)

 is a standard encryption algorithm for WLAN. It both controls the access to the network and guaran-

tees the integrity of the data. This method is considered vulnerable due to a range of weaknesses.

If you want to use WEP encryption, select the following settings:

Two options are available for the 

Authentication type

 under WEP.

Select 

Open

 if all clients are to be enabled for WLAN. Now there is virtually no other 

authentication.

Select 

Shared

 if you want to use authentication with the challenge response process. A 

shared code is used for authentication in this method. All WLAN users must know this 

code.

All other selection options under 

Authentication type

 are meaningless under WEP.

You can now store four codes in the lower section of the window. The selected code is always used. 

64 bit

 or 

128 bit

 encryption is 

supported. 128 bit encryption is more secure. First select whether you want to use 

Hexadecimal

 (allows characters from 0-9 and 

a-f to be used) or 

ASCII 

(you can use any characters). The setting and the selection of either 64 or 128 bit encryption determines the 

length of the code to be entered.

WEP 64 bit ASCII requires 5 characters

WEP 64 bit hexadecimal requires 10 characters

WEP 128 bit ASCII requires 13 characters

WEP 128 bit hexadecimal requires 26 characters

Examples:  64 bit hexadecimal (10 characters) = 231074a6ef

 

 

64 bit ASCII (5 characters) = j31n.

 

 

128 bit hexadecimal (26 characters) = 231074a6b9773ce43f91a5bef3

 

 

128 bit ASCII (13 characters) = urla0

00062742bda_GB.indd   Abs2:13

00062742bda_GB.indd   Abs2:13

17.09.2007   7:26:27 Uhr

17.09.2007   7:26:27 Uhr

Содержание 62742

Страница 1: ...Automatic con guration Page 08 4 2 Operation of the Windows Vista con guration program Page 08 4 3 Setting up an Ad hoc network Page 09 5 Con guring the operating system and computer Windows Seite 09...

Страница 2: ...rt the mains plug into the socket and start the PC 2 Installing the driver and con guration program on Windows 2000 XP After you start the operating system the Windows New Hardware Wizard dialogue box...

Страница 3: ...n entered here applies to all users of the network There are two methods a Con guration using the button Press the WPS button on the router access point Within two minutes you must press the PBC butto...

Страница 4: ...work overview To reduce the energy consumption you can run the device in power saving mode PSM In this mode certain functions are deactivated or run at a lower setting if they are not fully used Selec...

Страница 5: ...t WEP encryption WPA and WPA2 encryption Note Encryption is deactivated by default However for security reasons we recommend that you always use encryption 3 2 2 1 WEP encryption Wired Equivalent Priv...

Страница 6: ...nd punctuation marks can be used 64 characters are required for HEX whereby only characters from 0 9 and a f can be used If you do not have this code it can be found in your router access point or you...

Страница 7: ...PS tab page in the WLAN adapter s con guration program The connection is now established automatically b Pin code Make a note of the pin code which is displayed in the WLAN adapter s con guration prog...

Страница 8: ...you are asked to enter data concerning the network name and the security type More information is shown if you move the mouse cursor towards the appropriate eld Additional remarks concerning the netwo...

Страница 9: ...from your computer After the software is removed you may have to restart the system Save all open documents and close all programs before restarting the PC 7 Installing the driver and con guration pr...

Страница 10: ...select the hard drive where you installed the driver and the utility earlier The utility is installed in the Programs directory by default Double click the icon The following window opens This screen...

Страница 11: ...f the required network Encryption Type Encryption used in the target network Network Type type of network Infrastructure or ad hoc Open the Wireless Utility Using the Network overview Site survey tab...

Страница 12: ...a standard encryption algorithm for WLAN It both controls the access to the network and guaran tees the integrity of the data This method is considered vulnerable due to a range of weaknesses If you...

Страница 13: ...under Encryption Now enter the code used in the WPA preshared key eld The code entered must be absolutely identical with that used in the network It must be min 8 and max 63 random characters for ASCI...

Страница 14: ...15...

Отзывы: