User Manual
Table Of Contents
- Contents
- 1 Getting started
- 2 Installing the Access Point
- 3 Configuring the Access Point
- 3.1 Introduction
- 3.2 When to configure the Access Point
- 3.3 Starting the Web Interface
- 3.4 Launching Web Interface manually
- 3.5 Contents of Web Interface
- 3.5.1 Settings Summary
- 3.5.2 Wireless Settings
- 3.5.3 Security against unauthorized network access
- 3.5.4 To add a a client to the exception list
- 3.5.5 To delete a client from the exception list
- 3.5.6 Security against eavesdropping
- 3.5.7 Change WEP password
- 3.5.8 Security against unauthorized configuration
- 3.5.9 Identity
- 3.5.10 IP Settings
- 4 Troubleshooting
- 5 Technical specifications 11 Mbps WLAN Access Point
- 6 Regulatory notes and statements
- 6.1 Wireless LAN, Health and Authorization for use
- 6.2 Regulatory Information/disclaimers
- 6.3 USA-FCC (Federal Communications Commission) statement
- 6.4 FCC Radio Frequency Exposure statement
- 6.5 FCC Interference Statement
- 6.6 Export restrictions
- 6.7 Europe - EU R&TTE Declaration of Conformity
- 6.8 Restricted Wireless LAN device use in EU
- A TCP and IP settings
- B Wireless LAN
- Index
58
preliminary 3
Wireless LAN
Security
B.6.1 IEEE authentication
This method provides an encryption technique that makes it very difficult
to have unauthorized access to the network. Other authentication
methods may have been delivered for different types of Wireless LAN
devices.
B.6.2 Open Systems method
This is an IEEE authentication method that does not require password
protection.
B.6.3 WEP method
The IEEE 802.11 standard includes a shared key data privacy
mechanism, called 'Wired Equivalent Privacy'.
Only devices that share the same WEP key are allowed to communicate
with each other.
Features of WEP are:
• Data encryption using a
- 40 bit shared key (10 character password), or
- 128-bit shared key (26 character password).
• No key distribution mechanism. The shared key (password) must be
distributed manually to all personnel and either be remembered or
stored somewhere on the hard disk.
• Simple authentication of clients based on hardware address.