Titan Electronics Inc NETCOM423 Benutzerhandbuch
NetCom 123 WLAN, 423 WLAN Page
29
NetCom 123 WLAN, 423 WLAN,
or 104 bit keys, sometimes also named WEP40/WEP64 or
WEP104/WEP128. Which of this is required is defined by the
“Encryption Key” Parameter. The key may be entered as ASCII
characters, or as hexadecimal for a binary key. A string with 5
characters is WEP40 using an ASCII key. Using 10 characters as key
defines this key as also WEP40, but with a binary key in hexadecimal
notation. Likewise a 13 character string is WEP104 with ASCII, and 26
characters select WEP104 with a binary key.
WEP104/WEP128. Which of this is required is defined by the
“Encryption Key” Parameter. The key may be entered as ASCII
characters, or as hexadecimal for a binary key. A string with 5
characters is WEP40 using an ASCII key. Using 10 characters as key
defines this key as also WEP40, but with a binary key in hexadecimal
notation. Likewise a 13 character string is WEP104 with ASCII, and 26
characters select WEP104 with a binary key.
WPA Encryption is available for the TKIP protocol. The key is PSK
(Pre-Shared
(Pre-Shared
Key) and must be installed on all stations. It is
recommended to use WPA-PSK/TKIP with a binary key, generated
from random data.
“RTSThreshold” and “Fragmentation Threshold” are low level WLAN
parameters. They should match the configuration in the Access Point.
Higher values result in better data throughput. But when transmission
error occur, the impact is dramatic. In this case lower values provide
better security and better performance.
5.1.1.4. Encrypted
from random data.
“RTSThreshold” and “Fragmentation Threshold” are low level WLAN
parameters. They should match the configuration in the Access Point.
Higher values result in better data throughput. But when transmission
error occur, the impact is dramatic. In this case lower values provide
better security and better performance.
5.1.1.4. Encrypted
Communication
Firmware version 2.2 introduces a way for encrypted communication
with the NetCom Serial Device Server. This function establishes an
encrypted VPN tunnel between your computer and the NetCom. All
communication to the NetCom uses this new connection. No
application requires a change of operation, but seamlessly gets the
advantages of Encryption.
To build this tunnel NetCom uses the Open
with the NetCom Serial Device Server. This function establishes an
encrypted VPN tunnel between your computer and the NetCom. All
communication to the NetCom uses this new connection. No
application requires a change of operation, but seamlessly gets the
advantages of Encryption.
To build this tunnel NetCom uses the Open
Source product
OpenVPN™ (
). This is the configuration of the
parameters on the NetCom side. The function and the configuration of
OpenVPN™ is described with more details later in the section of
OpenVPN™ Client installation.
OpenVPN™ is described with more details later in the section of
OpenVPN™ Client installation.