User's Manual


Jh^c\i]ZLZW"7VhZY6YkVcXZYJhZg>ciZg[VXZ
&
'-
"7^iL:E
!SARESULTOFBIT7%0SPOTENTIALSECURITYWEAKNESSESAMORE
S
ECUREMETHODOFBITENCR
Y
PTIONWASDEVELOPEDBIT
ENCRYPTIONINCLUDESAKEYLENGTHOFBITSPLUSADDITIONALBITSOF
S
YSTEMGENERATEDDATABITSTOTAL3OMEHARDWAREMANUFACTURERS
R
E
F
ERTOBITASBITENCR
Y
PTION
-OSTO
F
THENEWWIRELESSEQUIPMENTINTHEMARKETTODA
Y
SUPPORTS
B
OT
H

BI
TAN
D

BI
T
7%0
ENCRYPT
I
ON
B
UTYOUM
IGH
T
H
AVEO
LD
ER
EQUIPMENTTHATONLYSUPPORTSBIT7%0!LL"ELKINWIRELESSPRODUCTS
WILLSUPPORTBOTHBITANDBIT7%0
:cXg
ne
i^dc@Z
nh
!FTERSELECTINGEITHERTHEBITORBIT7%0ENCRYPTIONMODEITIS
CRITICALTHATYOUGENERATEANENCRYPTIONKEY)FTHEENCRYPTIONKEYIS
NOTCONS
I
STENTT
H
ROU
GH
OUTT
H
EENT
I
REW
I
RE
L
ESSNETWOR
K
YOURW
I
RE
L
ESS
NETWOR
KI
N
G
D
EV
I
CESW
ILL
B
EUNA
BL
ETOCOMMUN
I
CATEW
I
T
H
ONEANOT
H
ER
ONYOURNETWORKANDYOUWILLNOTBEABLETOSUCCESS
F
ULLYCOMMUNICATE
WITHINYOURNETWORK
9OUCANENTERYOURKEYBYTYPIN
G
INTHEHEXKEYMANUALLYORYOUCAN
TYPEINAPASSPHRASEINTHEh0ASSPHRASEvFIELDANDCLICKh'ENERATEv
TOCREATEAKE
Y
!HEXHEXADECIMALKE
Y
ISACOMBINATIONOFNUMBERS
ANDLETTERSFROM!n&ANDn&ORBIT7%0
Y
OUNEEDTOENTER
H
EX
K
E
Y
S
&
OR
BI
T
7%0

Y
OUNEE
D
TOENTER
H
EX
K
E
Y
S
&O
R
I
N
S
T
A
N
CE
6;%;)78(9)2+)"W^iL:E`Z
n
8(
%(
%
;6;
%
;)77
'
8(
9))7
8(
9):,2&
'-
"W^iL:E`Zn
4HE7%0PASSPHRASEIS.
/
4THESAMEASA7%0KEY9OUR2OUTER
USESTHISPASSPHRASETO
G
ENERATEYOUR7%0KEYSBUTDIFFERENT
HARDWAREMANUFACTURERSMIGHTHAVEDIFFERENTMETHODSONGENERATING
THEKE
Y
S)F
Y
OUHAVEMULTIPLEVENDORSEQUIPMENTSIN
Y
OURNETWORK
THEEASIESTTHINGTODOISTOUSETHEHEX7%0KEYFROMYOUR2OUTEROR
ACCESSPO
I
NTAN
D
ENTER
I
TMANUA
LLY
I
NTOT
H
E
H
EX
7%0
K
E
Y
TA
BL
E
I
N
Y
OUR
2
OUTERSCON
F
I
G
URATIONSCREEN