User Manual
3e-528 Wireless Video Server Chapter 3: Access Point Conguration
32 29000142-001 A
3e-528 Wireless Video Server Chapter 3: Access Point Conguration
29000142-001 A 33
that of a wired LAN but has come under attack for its defaults and is not now
state of the art. WEP relies on the use of identical static keys deployed on client
stations and access points. But the use of WEP encryption provides some mea-
sure of security.
Utilities exist for scanning for networks and logging all the networks it runs
into—including the real SSIDs, the access point’s MAC address, the best sig-
nal-to-noise ratio encountered, and the time the user crossed into the network’s
space. These utilities can be used to determine whether your network is unse-
cured. Note that, if WEP is enabled, that same WEP key must also be set on each
wireless device that is to become part of the wireless network, and, if "shared
key" is accepted, then each wireless device must also be coded for "shared key".
To use WEP encryption, identify the level of encryption, the Default WEP key
and designate the WEP keys as shown on the screen.
WPA (non-FIPS)
Wi-Fi Protected Access or WPA was designed to enable use of wireless legacy
systems employing WEP while improving security. WPA uses improved data
encryption through the temporal key integrity protocol (TKIP) which scrambles
keys using a hashing algorithm and, by adding an integrity-checking feature, en-
sures that the keys haven’t been tampered with. In addition, user authentication
is enabled using the extensible authentication protocol (EAP).
If you wish to use WPA on the 3e-528, enable either WPA Pre-shared Key Set-
tings or WPA 802.1x Settings.
If you are a SOHO user, selecting pre-shared key means that you don’t have
the expense of installing a Radius Server. Simply input up to 63 character /
numeric / hexadecimals in the Passphrase eld. If your clients use WPA-TKIP,
select TKIP as encryption type. If your clients use WPA-AES, select AES-CCMP.
Re-keying time is the frequency in which new encryption keys are generated
and distributed to the client. The more frequent re-keying, the better the security.
For highest security, select the lowest re-keying interval.