Askey Computer Corp TCG220E27 Benutzerhandbuch
Page 41 / 59
802.11x Authentication introduction
If you enable the 802.11x authentication function, you will have to offer the following
information-
information-
WEP-64 / WEP-128(Wired Equivalent Privacy):
WEP-64/ WEP-128 is a simple security protocol for wireless networks that encrypts
transmitted data. The WEP key can be entered as a string of
10 hexadecimal characters (0–9 and A–F).
transmitted data. The WEP key can be entered as a string of
10 hexadecimal characters (0–9 and A–F).
WPA (Wi-Fi Protected Access)/WPA2:
It must be used in conjunction with an authentication server such as RADIUS to
provide centralized access control and management. It can provide stronger
encryption and authentication solution than none WPA modes. WPA2 is the second
generation of WPA security.
It must be used in conjunction with an authentication server such as RADIUS to
provide centralized access control and management. It can provide stronger
encryption and authentication solution than none WPA modes. WPA2 is the second
generation of WPA security.
WPA/WPA2 Encryption:
There are two types that you can choose,AES, TKIP+AES.
There are two types that you can choose,AES, TKIP+AES.
TKIP takes the original master key only as a starting point and derives its
encryption keys mathematically from this mater key. Then it regularly changes
and rotates the encryption keys so that the same encryption key will never be
used twice
encryption keys mathematically from this mater key. Then it regularly changes
and rotates the encryption keys so that the same encryption key will never be
used twice
AES provides security between client workstations operating in ad hoc mode. It
uses a mathematical ciphering algorithm that employs variable key sizes of 128,
192 or 256 bits.
uses a mathematical ciphering algorithm that employs variable key sizes of 128,
192 or 256 bits.