P-870HN-5
x
b Support Notes
All contents copyright (c) 2009 ZyXEL Communications Corporation.
Wireless Application Notes
Wireless Introduction
WEP Configuration (Wired Equivalent Privacy) Introduction
The 802.11 standard describes the communication that occurs in the wireless
LANs.
The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless
communication from eavesdropping, because the wireless transmissions are easier
to intercept than transmissions over wired networks, and wireless is a shared
medium. Everything that is transmitted or received over a wireless network can be
intercepted.
The WEP relies on a secret key that is shared between a mobile station (e.g. a
laptop with a wireless Ethernet card) and an access point (i.e. a base station). The
secret key is used to encrypt packets before they are transmitted, and an integrity
check is used to ensure that packages are not modified during the transition. The
standard does not discuss how the shared key is established. In practice, most
Содержание P-870HN-5xb
Страница 22: ...P 870HN 5xb Support Notes All contents copyright c 2009 ZyXEL Communications Corporation 17 Click Apply Save...
Страница 32: ...P 870HN 5xb Support Notes All contents copyright c 2009 ZyXEL Communications Corporation 16 Click Apply Save...
Страница 42: ...P 870HN 5xb Support Notes All contents copyright c 2009 ZyXEL Communications Corporation 19 Click Apply Save...
Страница 97: ...P 870HN 5xb Support Notes All contents copyright c 2009 ZyXEL Communications Corporation...