User's Manual

Chapter 5 Wireless
B222s User’s Guide
60
5.7.2.4 Encryption
Wireless net works can use encrypt ion to prot ect t he inform at ion that is sent in t he wireless
network. Encryption is like a secret code. I f you do not know t he secret code, you cannot
underst and t he m essage.
The types of encrypt ion you can choose depend on t he t ype of aut hent icat ion. ( See
Section 5.7.2.3
on page 59
for inform ation about t his.)
For exam ple, if the wireless net work has a RADI US server, you can choose W PA or W PA2 . I f users
do not log in to t he wireless net work, you can choose no encrypt ion, St a tic W EP, W PA- PSK, or
W PA2 - PSK.
Usually, you should set up the st r ongest encrypt ion that every device in the wireless net work
support s. For exam ple, suppose you have a wireless net work with the LTE Device and you do not
have a RADI US server. Therefor e, t here is no aut hent icat ion. Suppose t he wireless net w ork has two
devices. Device A only support s WEP, and device B support s WEP and WPA. Therefore, you should
set up St at ic W EP in t he wireless net work.
Not e: I t is recom m ended t hat wireless networks use W PA- PSK, W PA, or stronger
encrypt ion. The ot her types of encryption are bet ter t han none at all, but it is still
possible for unaut horized wireless devices to figure out t he original inform at ion
pret ty quickly.
When you select W PA2 or W PA2 - PSK in your LTE Device, you can also select an opt ion (W PA
com pa t ible ) t o support WPA as w ell. I n t his case, if som e of t he devices support WPA and som e
support WPA2, you should set up W PA2 - PSK or W PA2 ( depending on t he type of wir eless net work
login) and select t he W PA com pat ible option in t he LTE Device.
Many t ypes of encrypt ion use a key to prot ect t he inform ation in t he wireless network. The longer
the key, t he stronger the encrypt ion. Every device in t he wireless network m ust have the sam e key.
5.7.3 Signal Problems
Because wireless networks are radio net works, their signals are subj ect to lim itat ions of distance,
int erference and absorpt ion.
Problem s w it h distance occur when t he t wo radios are t oo far apart . Problem s with int erference
occur when other radio waves interrupt the data signal. I nt er ference m ay com e from ot her radio
transm issions, such as m ilitary or air t raffic control com m unicat ions, or from m achines t hat are
coincident al em itt ers such as elect ric m otors or m icrowaves. Problem s wit h absorpt ion occur when
physical objects ( such as t hick walls) are bet w een t he t wo radios, m uffling t he signal.
Table 18 Types of Encrypt ion for Each Type of Aut hent icat ion
NO AUTHENTICATION RADIUS SERVER
W ea ke st No Security WPA
St at ic WEP
WPA- PSK
Str onge st WPA2- PSK WPA2