Fujitsu CONNECT2AIR AP-600RP-USB ユーザーズマニュアル

ページ / 63
CONNECT2AIR™ WLAN AP-600RP-USB
 
 
Page 35 / 62
  
8.4.8  WLAN Security  
To protect your intellectual property, secure your wireless connection! This Access-
Point is equipped with a sophisticated security algorithm to protect against intruders 
entering your system or listening to what you are transferring over your network. 
 
Security is divided in two parts: Authentication and Encryption.  
 
Authentication
 
• 
Who is my partner to whom I am sending data / Who am I? 
• 
How can I guarantee that I am myself? 
• 
How can I guarantee that I am still myself – while sending data? 
 
Authentication is needed in order to guarantee your identity. The authority that identifies 
the client is a so-called RADIUS server. On the client side, an 802.1x protocol is responsi-
ble for handling the authentication process. 
 
Encryption
 
• 
How can I ensure that no third party is reading my data? 
• 
How can I ensure that my data has not been changed during the transmission process? 
 
Encryption guarantees safe communication between two parties. All data is encrypted at 
the source and decrypted at the destination. Two types of encryption are available within 
this device: WEP (Wired Equivalent Privacy) and dynamic WEP with periodically changing 
keys. 
 
WPA (Wi-Fi Protected Access) is a mix of both authentication and encryption in a single 
application. It provides a legacy WEP (dynamic WEP) and standard authentication en-
hancement (802.1x). As it does not need a RADIUS server, it fits optimally into the home 
and SoHo environment as it provides a high level of security. 
 
L
 
All devices in your WLAN must be configured identically so that they can 
communicate with each other. First configure the AP and take note of your set-
tings. Once the settings have been applied, the connection to the clients will be 
lost (e.g. AP with WEP / clients no WEP). Proceed by updating all of your cli-
ents, which can then reconnect to the AP. 
 
What type of security to check: 
 
To help you achieve the right level of security, the table below indicates the different levels 
of security that can be applied to your AP and devices: 
 
SEC level
WEP
dyn WEP
WPA PSK WPA EAP
802.1X
RADIUS
Usage
NONE
:
:
:
:
:
:
ad-hoc session
LOW
;
:
:
:
:
:
Home
;
:
:
:
;
;
SoHo
:
;
:
:
;
;
SoHo
:
:
;
:
:
:
Home / SoHo
HIGH
:
:
:
;
;
 auto
;
SoHo / Enterprise
AUTHENTICATION
ENCRYPTION