User guide
Authentication Configuration Wireless Interface
9-19
iMG/RG Software Reference Manual (Wireless)
9.1.4.1.2 Open Authentication - WEP Encryption @ 64 bit
WEP (Wired Equivalent Privacy) is the basic 802.11's encryption algorithm implemented in the Medium Access
Control Layer (MAC layer) of wireless network devices. WEP has been deprecated by IEEE as it provides secu-
rity that deters only unintentional use, leaving the network vulnerable to deliberate compromise.
For better security levels use WPA or WPA2.
The open network authentication system with WEP encryption doesn't pass on any information to the client in
plain text, just the corresponding encrypted text.
On CPE side, a 64bit WEP encrypted wireless network can be configured through the following CLI commands
list:
port wireless set Disable false
port wireless set ESSID iMG634WB-172.32.2.146 (example)
802.1x authenticator set authentication local
802.1x authenticator set authentication disable
port wireless set Authentication Open
port wireless set Encryption WEP64
port wireless set Mode64Key0 11-22-33-44-55 (example)
port wireless set Mode64Key1 66-77-88-99-aa (example)
port wireless set Mode64Key2 bb-cc-dd-ee-ff (example)
port wireless set Mode64Key3 10-1a-aa-a1-01 (example)
9.1.4.1.3 Open Authentication - WEP Encryption @ 128 bit
On CPE side, a 128bit WEP encrypted wireless network can be configured through the following CLI com-
mands list:
port wireless set Disable false
port wireless set ESSID iMG634WB-172.32.2.143 (example)
802.1x authenticator set authentication local
802.1x authenticator set authentication disable
port wireless set Authentication Open
port wireless set Encryption WEP128
port wireless set Mode128Key0 11-22-33-44-55-66-77-88-99-aa-bb-cc-dd*
port wireless set Mode128Key1 66-77-88-99-aa-bb-cc-dd-ee-ff-11-22-33*
port wireless set Mode128Key2 bb-cc-dd-ee-ff-11-22-33-44-55-66-77-88*
port wireless set Mode128Key3 10-1a-aa-a1-10-1a-aa-a1-10-1a-aa-a1-77*
*examples
9.1.4.2 Shared Authentication Configuration
With a shared-key authentication process the AP (Access Point) sends challenge text to the client in clear text,
and then the client encrypts it and sends it back to the AP for authentication.