Fujitsu CONNECT2AIR AP-600RP-USB Benutzerhandbuch

Seite von 63
CONNECT2AIR™ WLAN AP-600RP-USB
 
 
Page 37 / 62
  
8.4.10 Wired Equivalent Privacy (WEP) Settings 
 
Use this security standard to obtain at least the minimum in security in your WLAN. To use 
WEP in the AccessPoint, all clients must have standardized security settings. The WEP 
keys must therefore be adapted directly after configuration of the AccessPoint.  
 
 
 
 
WEP keys 1, 2, 3 & 4:  
When you enable the 64- or 128-bit WEP algorithm, please select one WEP key to be 
used. If you are using a 128-bit key (recommended), you have to enter a 26-digit hexa-
decimal key (0, 1, 2…8, 9, A, B…F) in the appropriate field: 
 
Example 128 bit:   FEDCBA01234567890123456789  
26 digits 
Example 
64 
bit: 
 
FEDCBA0123    10 
digits 
 
Passphase generator: Since hexadecimal characters are difficult to memorize, this de-
vice offers a conversion utility from a simple word into the hexadecimal code. Click the key 
you want to update, enter your passphrase and press “Generate Keys”. The key is then 
updated. Proceed likewise with the other three keys if necessary. Manual entry of the keys 
in the client is recommended. 
 
Once the WEP security settings are complete, you also have to copy them to the client as 
otherwise further configuration of the AccessPoint, at least via wireless clients, is no longer 
possible (AP with WEP, wireless client without WEP ► no further communication). 
 
L
 
Note: Even if different suppliers or even devices within 
the same brand support the passphrase generator, it 
cannot be taken as a given that keys generated from dif-
ferent devices will be the same. You should therefore al-
ways use just one passphrase generator for creating keys 
in the wireless network. Add the keys manually. Always 
carefully compare the entries in the AccessPoint and in 
the clients.  
 
  
Secure your WLAN by applying 
WEP to every AccessPoint and 
client in your WLAN. Instead of 
WEP, use the more secure  
WPA if clients with a supplicant 
(software) are available. 
Always use the highest avail-
able security level and key 
length (128 bits). 
 
APPLICATION