User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Configuring Wireless Networks
Chapter 10: Working with Wireless Networks 289
In this field… Do this…
Key 1, 2, 3, 4
length
Select the WEP key length from the drop-down list.
The possible key lengths are:
• 64 Bits. The key length is 10 characters.
• 128 Bits. The key length is 26 characters.
• 152 Bits. The key length is 32 characters.
Note: Some wireless card vendors call these lengths 40/104/128,
respectively.
Note: WEP is generally considered to be insecure, regardless of the
selected key length.
Key 1, 2, 3, 4 text
box
Type the WEP key, or click Random to randomly generate a key matching
the selected length. The key is composed of hexadecimal characters 0-9
and A-F, and is not case-sensitive.