Titan Electronics Inc NETCOM423 Manuel D’Utilisation
adapts to the configuration of the Access Point.
The “Channel” is used in Ad-hoc mode.
“Encryption Type” defines the encryption of the radio transmission. It
may be
The “Channel” is used in Ad-hoc mode.
“Encryption Type” defines the encryption of the radio transmission. It
may be
Off
,
WEP
or
WPA-PSK/TKIP
. The WEP encryption may use 40
or 104 bit keys, sometimes also named WEP40/WEP64 or
WEP104/WEP128. Which of this is required is defined by the
“Encryption Key” Parameter. The key may be entered as ASCII
characters, or as hexadecimal for a binary key. A string with 5
characters is WEP40 using an ASCII key. Using 10 characters as key
defines this key as also WEP40, but with a binary key in hexadecimal
notation. Likewise a 13 character string is WEP104 with ASCII, and 26
characters select WEP104 with a binary key.
WPA Encryption is available for the TKIP protocol. The key is PSK
(Pre-Shared
WEP104/WEP128. Which of this is required is defined by the
“Encryption Key” Parameter. The key may be entered as ASCII
characters, or as hexadecimal for a binary key. A string with 5
characters is WEP40 using an ASCII key. Using 10 characters as key
defines this key as also WEP40, but with a binary key in hexadecimal
notation. Likewise a 13 character string is WEP104 with ASCII, and 26
characters select WEP104 with a binary key.
WPA Encryption is available for the TKIP protocol. The key is PSK
(Pre-Shared
Key) and must be installed on all stations. It is
recommended to use WPA-PSK/TKIP with a binary key, generated
from random data.
from random data.
“RTSThreshold” and “Fragmentation Threshold” are low level WLAN
parameters. They should match the configuration in the Access Point.
Higher values result in better data throughput. But when transmission
error occur, the impact is dramatic. In this case lower values provide
better security and better performance.
5.3.2.3. Encrypted
parameters. They should match the configuration in the Access Point.
Higher values result in better data throughput. But when transmission
error occur, the impact is dramatic. In this case lower values provide
better security and better performance.
5.3.2.3. Encrypted
Communication
Firmware version 2.2 introduces a way for encrypted communication
with the NetCom Serial Device Server. This function establishes an
encrypted VPN tunnel between your computer and the NetCom. All
communication to the NetCom uses this new connection. No
application requires a change of operation, but seamlessly gets the
advantages of Encryption.
with the NetCom Serial Device Server. This function establishes an
encrypted VPN tunnel between your computer and the NetCom. All
communication to the NetCom uses this new connection. No
application requires a change of operation, but seamlessly gets the
advantages of Encryption.
To build this tunnel NetCom uses the
Open
Open
Source product OpenVPN™
). This is the configuration
of the parameters on the NetCom side. The
function and the configuration of OpenVPN™
is described with more details later in the
section of OpenVPN™ Client installation.
function and the configuration of OpenVPN™
is described with more details later in the
section of OpenVPN™ Client installation.
ServerConfig
+--------------------+
| Parameter |
| Wireless |
|
| Parameter |
| Wireless |
|
OpenVPN
|
| Authentification |
| Date & Time |
| Info |
+--------------------+
Image 65: Telnet Wireless
| Date & Time |
| Info |
+--------------------+
Image 65: Telnet Wireless
Configuration
823RM WLAN, 1623RM WLAN
Page
58