3Com Corporation WL311 Manual De Usuario
3
Configuring the Bridge
18
Security Settings
Enabling security is the best way to protect your data from unauthorized observers. 3Com
recommends using the strongest encryption setting supported by your wireless bridge.
recommends using the strongest encryption setting supported by your wireless bridge.
The 3Com Wireless Building-to-Building Bridge supports the following levels of hardware
encryption:
encryption:
Both basic and strong shared-key security settings use industry-standard 802.11 Wired
Equivalent Privacy (WEP) encryption methods. Using either setting, all wireless bridges in a
single wireless LAN service area must share the same security key. The WEP key settings for
any associating bridge pair must match exactly.
Equivalent Privacy (WEP) encryption methods. Using either setting, all wireless bridges in a
single wireless LAN service area must share the same security key. The WEP key settings for
any associating bridge pair must match exactly.
You can set the WEP keys in one of two ways. You can:
■
Have the keys automatically generated — Allows you to easily enter any string of
characters (as you would enter a password) that will automatically generate the WEP
keys in hexadecimal notation the same way for every wireless bridge you configure.
characters (as you would enter a password) that will automatically generate the WEP
keys in hexadecimal notation the same way for every wireless bridge you configure.
■
Enter the keys manually — Allows you to use an existing set of encryption keys, but
requires that you manually enter four long series of hexadecimal numbers in exactly
the same way for every wireless bridge you configure.
requires that you manually enter four long series of hexadecimal numbers in exactly
the same way for every wireless bridge you configure.
NOTE: The 128-bit encryption setting may not be available to you, depending on
U.S. export restrictions to your country.
U.S. export restrictions to your country.
Security Level
Description
No Security (Open System)
No encryption. The network communications could be intercepted by
unintended recipients.
unintended recipients.
40-bit shared key
Basic encryption.
128-bit shared key
Strong encryption.