beautypg.com

INTELLINET NETWORK 524995 Wireless 300N Dual-Band USB Adapter User Manual User Manual

Page 16

background image

or PSK, technology. It also includes a new advanced encryption

mechanism using the Advanced Encryption Standard (AES). AES is

required for corporate or government users. The difference between

WPA and WPA2 is that WPA2 provides data encryption via AES. In

contrast, WPA uses the Temporal Key Integrity Protocol (TKIP).

• WPA2-PSK: This is also for home and small business use. The

difference between WPA-PSK and WPA2-PSK is that WPA2-PSK

provides data encryption via the AES. In contrast, WPA-PSK uses

the Temporal Key Integrity Protocol (TKIP).

• CCKM: Cisco Centralized Key Management (CCKM) is a form of fast

roaming. When a wireless LAN is configured for fast reconnection,

a LEAP-enabled client device can roam from one access point to

another without involving the main server. Using CCKM, an access

point configured to provide wireless domain services (WDS) takes

the place of the RADIUS server and authenticates the client without

any perceptible delay in voice or other time-sensitive applications.”

802.1x Setting: When Authentication Type is set to “Open,” “Shared,”

“WPA” or “WPA2,” you can also enable IEEE 802.1x Setting to use the

authentication server or certification server to authenticate client users.

NOTE: See the two separate 802.1x Setting sections below for details.

Encryption: Select from the drop-down menu.

• None: Disables the encryption mode.

• WEP: Enables the WEP Data Encryption. When the item is selected,

you need to continue setting the WEP Encryption keys.

• TKIP: The Temporal Key Integrity Protocol changes the temporal key

every 10,000 packets (a kind of message transmitted over a network.)

This ensures much greater security than the standard WEP security.

• AES: AES has been developed to ensure the highest degree of

security and authenticity for digital information. It’s the most advanced

solution defined by IEEE 802.11i for security in the wireless network.

NOTE: All devices in the network should use the same encryption

method to ensure the security of communications.

WPA Pre-Shared Key: The WPA-PSK key can be 8 to 64 characters in

length and can be letters or numbers. This same key must be used on

all the wireless stations in the network.

WEP Key (Key#1–4): WEP keys are used to encrypt data transmitted

CONFIGURATION

16