User's Manual
NPort W2150A/W2250A Series  Web Console: Network Settings 
7-18 
Encryption 
Default  Disable 
Options  Disable, WEP, TKIP, AES-CCMP 
Description  This field specifies the type of encryption to use during wireless communication. Different 
encryption methods are available depending on the Authentication setting. Also, each 
encryption method has its own set of parameters that may also require configuration.  
Disable: No encryption is applied to the data during wireless communication. This option is 
only available if Authentication is set to Open System.
WEP: Wired Equivalent Privacy (WEP) is only available for Open System and Shared Key 
authentication methods. Data is encrypted according to a key. The NPort supports both 64 
and 128-bit keys. This method may deter casual snooping but is not considered very 
secure. 
TKIP: Temporal Key Integrity Protocol (TKIP) is only available for WPA, WPA2, WPA-PSK, 
and WPA2-PSK authentication methods. TKIP is part of a draft standard from the IEEE 
802.11i working group and utilizes the RC4 stream cipher with 128-bit keys for encryption 
and 64-bit keys for authentication. TKIP improves on WEP by adding a per-packet key 
mixing function to de-correlate the public initialization vectors (IVs) from weak keys.  
AES-CCMP: This is a powerful encryption method that is only available for WPA, WPA2, 
WPA-PSK, and WPA2-PSK authentication methods. Advanced Encryption Standard (AES) is 
the block cipher system used by the Robust Secure Network (RSN) protocol and is 
equivalent to the RC4 algorithm used by WPA. CCMP is the security protocol used by AES, 
equivalent to TKIP for WPA. Data undergoes a Message Integrity Check (MIC) using a 
well-known and proven technique called Cipher Block Chaining Message Authentication 
Code (CBC-MAC). The technique ensures that even a one-bit alteration in a message 
produces a dramatically different result. Master keys are not used directly but are used to 
derive other keys, each of which expire after a certain amount of time. Messages are 
encrypted using a secret 128-bit key and a 128-bit block of data. The encryption process 
is complex, but the administrator does not need to be aware of the intricacies of the 
computations. The end result is encryption that is much harder to break than even WPA. 
PSK Passphrase 
Default 
Options  free text (e.g., “This is the WLAN passphrase”) 
Description  This field is only available for WPA-PSK and WPA2-PSK authentication methods. If the 
NPort’s passphrase does not match the AP’s passphrase, the connection will be denied. A 
PSK of sufficient strength—one that uses a mix of letters, numbers and non-alphanumeric 
characters—is recommended.  










