User guide
Wireless Settings
5-31
5
- TKIP/AES: Uses either TKIP or AES keys for encryption. WPA/WPA2 mixed 
modes allow both WPA and WPA2 clients to associate to a common SSID 
interface. In mixed mode, the unicast encryption cipher (TKIP or AES-CCMP) is 
negotiated for each client.
• Default Key ID – Sets the WEP key used 
for authentication. 
(Default: 1; Range: 1~4)
• Key 1 ~ Key 4 – Sets WEP key values. 
The user must first choose between ASCII 
or Hexadecimal keys. At least one key 
must be specified. Each WEP key has an 
index number. The selected key is used for authentication and encryption on the 
VAP interface. Enter key values that match the key type and length settings. 
Standard keys are either 5 or 13 alphanumeric characters; or 10 or 26 hexadecimal 
digits. 
(Default: ASCII, no prese
t value) 
• WPA Group-Key ReKey Method – WPA 
Rekeying is an extra security measure 
whereby the broadcast WPA authentication 
key is automatically changed after a certain 
time period or after a certain number of packets have been sent. (Default: 
Disabled)
• WPA Group-Key ReKey Interval – The 
elapsed time after which the wireless AP/
Router will change the unicast WPA 
authentication key. (Default: 0; Range: 
0~67108864)
• WPA2 Pairwise Master Key Cache 
Interval – The elapsed time after which the 
wireless AP/Router will delete the WPA2 
master keys from its security association 
cache. 
• WPA2 Pre-Authentication Support – Each time a client roams to another access 
point it has to be fully re-authenticated. This authentication process is time 
consuming and can disrupt applications running over the network. WPA2 includes 
a mechanism, known as pre-authentication, that allows clients to roam to a new 
access point and be quickly associated. The first time a client is authenticated to a 
wireless network it has to be fully authenticated. When the client is about to roam 
to another access point in the network, the access point sends pre-authentication 
messages to the new access point that include the client’s security association 
information. Then when the client sends an association request to the new access 
point, the client is known to be already authenticated, so it proceeds directly to key 










