D-Link DIS-3650AP Outdoor Industrial AC1200 Access Point

User Manual - Page 25

For DIS-3650AP.

PDF File Manual, 101 pages, Read Online | Download pdf file

DIS-3650AP photo
Loading ...
Loading ...
Loading ...
Web User Interface
25
Wireless security is a key concern for any wireless network installed. Wireless networks will broadcast its presence for anyone to connect to it. Today, wireless
security has advanced to a level where it is virtually impenetrable.
There are mainly two forms of wireless encryption and they are called Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP was the rst
security method developed. It is a low level encryption but better than no encryption. WPA is the newest encryption protocol. With the advanced WPA2
standard wireless networks have nally reach a point where the security is strong enough to give users the peace of mind when installing wireless networks.
Wireless Security
Wired Equivalent Privacy (WEP)
Encryption:
Key Type*,**:
Key Size:
Key Index (1-4):
Key:
Use the radio button to disable or enable
encryption.
Select HEX or ASCII.
Select 64 Bits or 128 Bits.
Select the 1st through the 4th key to be the active
key.
Input up to four keys for encryption. You will select
one of these keys in the Key Index drop-down
menu.
**Hexadecimal (HEX) digits consist of the numbers 0-9 and the letters A-F.
*ASCII (American Standard Code for Information Interchange) is a code that represents English letters using
numbers ranging from 0-127.
WEP provides two variations called Open System and Shared Key.
Open System sends a request to the access point and if the key used matches the one congured on the access point, the access point will return a success
message back to the wireless client. If the key does not match the one congured on the access point, the access point will deny the connection request from
the wireless client.
Shared Key sends a request to the access point and if the key used matches the one congured on the access point, the access point will send a challenge
to the client. The client will then again send a conrmation of the same key back to the access point where the access point will either return a successful or a
denial packet back to the wireless client.
Loading ...
Loading ...
Loading ...