User Guide
System Configuration
28
NXA-WAP250G 802.11b/g Wireless Access Point
The displayed items on this page can be described as follows:
WEP Status – Enables the NXA-WAP250G to use WEP shared keys. If enabled, you must
configure at least one key for the VAP interface and all its clients.
Key Type – Select the preferred method of entering WEP encryption keys on the NXA-
WA P 2 5 0G .
Hexadecimal: Enter keys as hexadecimal digits (0 to 9 and A to F).
Alphanumeric: Enter keys as alphanumeric characters.
Setting Key – Sets WEP key values for one or two keys. At least one key must be specified.
Each WEP key has an index number. Index numbers 1 and 2 apply to VAP #1 interface and
numbers 3 and 4 apply to VAP #2 interface. The selected key is used for authentication and
encryption on the VAP interface.
Enter key values that match the key type and length settings. Select 64 Bit, 128 Bit, or
152 Bit key length. Note that the same size of encryption key must be supported on all
wireless clients. (Default: 64 Bit)
64 Bit: Enter keys as 5 alphanumeric characters or 10 hexadecimal digits.
128 Bit: Enter keys as 13 alphanumeric characters or 26 hexadecimal digits.
152 Bit: Enter keys as 16 alphanumeric characters or 32 hexadecimal digits.
WPA-PSK Security
Wi-Fi Protected Access (WPA) employs a combination of technologies to provide an enhanced security
solution for wireless networks. The WPA Pre-shared Key (WPA-PSK) mode for small networks uses a
common password phrase that must be manually distributed to all clients that want to connect to the
network.
WPA2 is a further security enhancement that includes the now ratified IEEE 802.11i wireless security
standard. Both WPA and WPA2 provide very robust security through the support of the Advanced
Encryption Standard (AES) and Temporal Key Integrity Protocol (TKIP) encryption ciphers (FIG. 25).
WEP 152 is not supported on the MVP-8400 Touch Panel.
Key index and type must match that configured on all clients.
FIG. 25 WPA-PSK Wireless Security
The computationally intensive operations of AES encryption requires hardware
support on client devices. Before implementing AES in the network, be sure that
wireless client hardware is AES or WPA2 compliant.