beautypg.com

Basic security configurations, Basic security configurations -24 – Avery Dennison 7411 Print Server User Manual

Page 48

background image

B a s i c S e c u r i t y C o n f i g u r a t i o n s

There are two main decisions to be made when choosing wireless security:
encryption method and authentication protocol. The encryption method
determines the algorithm used to encrypt the message. The authentication
type specifies how users are identified and verified on a network. Is the
device seeking connection what (and who) it claims to be?

Select an Encryption Method from the following table:

Encryption Method

Type Algorithm Size

(bits)

Description

WEP

RC4

64/128

This is the 64 or 128 bit WEP Key that
must match other nodes’ encryption keys
in order to communicate. The user can
only define 10 hex characters (40 bits) for
64 bit WEP or 26 characters (104 bits) for
128 bit WEP.

WPA

RC4

64/128

Improves on WEP by using TKIP*
(Temporal Key Integrity Protocol), which
dynamically changes the encryption key
and MIC (Message Integrity Code), which
replaces CRC.

WPA2

AES

128

Improves on WPA by replacing RC4 with
AES (Advanced Encryption Standard) for
encryption. The user can only define 26
characters (104 bits) for 128 bit WPA2.

* Dynamic WEP cannot be selected directly, so select 128 for the

encryption mode and select an authentication mode from one of the
following: LEAP, PEAP, EAP-FAST, TLS, or TTLS.

4-24 Ethernet Operating Instructions