INTELLINET NETWORK 524995 Wireless 300N Dual-Band USB Adapter User Manual User Manual
Page 16
or PSK, technology. It also includes a new advanced encryption
mechanism using the Advanced Encryption Standard (AES). AES is
required for corporate or government users. The difference between
WPA and WPA2 is that WPA2 provides data encryption via AES. In
contrast, WPA uses the Temporal Key Integrity Protocol (TKIP).
• WPA2-PSK: This is also for home and small business use. The
difference between WPA-PSK and WPA2-PSK is that WPA2-PSK
provides data encryption via the AES. In contrast, WPA-PSK uses
the Temporal Key Integrity Protocol (TKIP).
• CCKM: Cisco Centralized Key Management (CCKM) is a form of fast
roaming. When a wireless LAN is configured for fast reconnection,
a LEAP-enabled client device can roam from one access point to
another without involving the main server. Using CCKM, an access
point configured to provide wireless domain services (WDS) takes
the place of the RADIUS server and authenticates the client without
any perceptible delay in voice or other time-sensitive applications.”
802.1x Setting: When Authentication Type is set to “Open,” “Shared,”
“WPA” or “WPA2,” you can also enable IEEE 802.1x Setting to use the
authentication server or certification server to authenticate client users.
NOTE: See the two separate 802.1x Setting sections below for details.
Encryption: Select from the drop-down menu.
• None: Disables the encryption mode.
• WEP: Enables the WEP Data Encryption. When the item is selected,
you need to continue setting the WEP Encryption keys.
• TKIP: The Temporal Key Integrity Protocol changes the temporal key
every 10,000 packets (a kind of message transmitted over a network.)
This ensures much greater security than the standard WEP security.
• AES: AES has been developed to ensure the highest degree of
security and authenticity for digital information. It’s the most advanced
solution defined by IEEE 802.11i for security in the wireless network.
NOTE: All devices in the network should use the same encryption
method to ensure the security of communications.
WPA Pre-Shared Key: The WPA-PSK key can be 8 to 64 characters in
length and can be letters or numbers. This same key must be used on
all the wireless stations in the network.
WEP Key (Key#1–4): WEP keys are used to encrypt data transmitted
CONFIGURATION
16