Asante Technologies Voyager II User Manual
Page 50

susceptible to eavesdropping than wired networks. WEP uses a simple algorithm to
provide confidentiality comparable to that of a traditional wired network.
WEP Encryption: WEP encryption function
When the base station (AP), which you want to access, has enabled the encryption function,
you need to acquire the following information by accessing its encryption settings. You can
use a computer equipped with wireless networking function to view the available wireless
networks from the Windows system.
① Encryption mode (64Bit or 128Bit)
② Authentication type
③ Group (KEY1, KEY2, KEY3, KEY4)
Then change the settings on the wireless networking setting page to make them conform
to the settings of the base station.
2. Wi-Fi Protected Access (WPA and WPA2) is a certification program administered by
the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi
Alliance to secure wireless computer networks.
50