beautypg.com

Chapter 3 - software configuration, Wpa encryption, Wpa pre-shared key – Asus WL-320gE User Manual

Page 28: Wep encryption, 6-bit wep encryption, Bit wep encryption

background image

3. Software

28

ASUS 802.11g Access Point

Chapter 3 - Software Configuration

Access Point

WPA Encryption

When “WPA-PSK” authentication method is used, the newly proposed TKIP

(Temporal Key Integrity Protocol) or AES encryption schemes are applied.

WPA Pre-Shared Key

When you select “TKIP” or “AES” as the WPA Encyption, this field is used as

a password to begin the encryption process. Key in a password with 8 to 63

characters.

WEP Encryption

When you select “Open or Shared Key”, “Shared Key”, or “Radius with 802.11x”

authentication methods are selected, traditional WEP encryption is applied.

NOTE:

When “WPA” or “WPA-PSK” authentication methods are selected, you still can set WEP

encryption for those clients that do not support WPA/WPA-PSK. Please note that Key Index for

WEP key is limited to 2 or 3 when both WPA and WEP encryption are supported at the same

time.

6/128-bit versus 0/10-bit

The following section explains low-level (64-bit) and high-level (128-bit) WEP

Encryption schemes:

6-bit WEP Encryption

64-bit WEP and 40-bit WEP refer to the same encryption level and can

interoperate in a wireless network. This level of WEP encryption uses a 40-bit (10

Hex character) encryption scheme as a secret key, which is set by the user, and a

24-bit “Initialization Vector” scheme, which is not under user control.

Together these two schemes make a 64-bit (40 + 24) encryption scheme. Some

vendors refer to this level of WEP as 40-bit and others refer to this as 64-bit. ASUS

WLAN products use the term 64-bit when referring to this lower level of encryption.

128-bit WEP Encryption

104-bit WEP and 128-bit WEP refer to the same encryption level and can

interoperate on a wireless network. This level of WEP encryption uses a 104-bit

(26 Hex character) encryption scheme as a secret key which is set by the user,

and a 24-bit “Initialization Vector”, which is not under user control.