Ubiquiti AirRouter HP [19/61] Wireless security

Ubiquiti AirRouter HP [19/61] Wireless security
15
Chapter 5: Wireless TabAirRouter
HP User Guide
Ubiquiti Networks, Inc.
Automatic When selected, the rate algorithm will select
the best data rate, depending on link quality conditions.
It is recommended that you use this option, especially if
you are having trouble getting connected or losing data
at a higher rate. Refer to the Advanced section for detailed
information about rate algorithms.
Wireless Security
In Access Point and Access Point WDS mode, this is where
you configure the wireless security settings that will be
used by the devices on your wireless network.
In Station or Station WDS mode, you will need to match
the security settings of the Access Point that the AirRouter
HP is associated with.
Security The AirRouter HP supports the following
wireless security methods:
•
None Creates an open network without any security.
• WEP WEP (Wired Equivalent Privacy) is the oldest and
least secure security algorithm. WPA™/WPA2™ security
methods should be used when possible.
• WPA WPA™ or Wi-Fi Protected Access was developed as
a stronger encryption method over WEP.
•
WPA-TKIP WPA™ (Wi-Fi Protected Access) security
mode with TKIP support only. TKIP (Temporal Key
Integrity Protocol) uses the RC4 encryption algorithm.
•
WPA-AES WPA™ (Wi-Fi Protected Access) security
mode with AES support only. AES (also known as CCMP)
- Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol which uses the Advanced
Encryption Standard (AES) algorithm.
• WPA2 WPA2™ was developed to strengthen wireless
encryption security and is stronger than WEP and
WPA™.
• WPA2-TKIP WPA2™ (Wi-Fi Protected Access) security
mode with TKIP support only. Temporal Key Integrity
Protocol which uses RC4 encryption algorithm.
• WPA2-AES WPA2™ (Wi-Fi Protected Access) security
mode with AES support only. AES (also known as
CCMP) - Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol which uses the
Advanced Encryption Standard (AES) algorithm. This
is the strongest security option available. If all of the
wireless devices on your network support this option, it
is recommended that you select it.
WEP
Authentication Type One of the following authentication
methods should be selected if WEP security is used:
• Open The station is authenticated automatically by the
AP (selected by default).
• Shared Key Station is authenticated after the
challenge, generated by the AP.
WEP Key Length This determines the length of the WEP
security key. Select one of the two key length options:
• 64-bit This option is selected by default. A 64-bit key is
10 HEX or 5 ASCII characters in length.
• 128-bit The 128-bit option provides a little more
security and is 26 HEX or 13 ASCII characters in length.
Key Type Specifies the character format for the WEP key:
• HEX Selected by default, this option uses hexadecimal
characters. 0-9, A-F or a-f are valid characters.
• ASCII ASCII uses the standard English alphabet and
numeric characters.
WEP Key Enter the WEP encryption key adhering to the
selections you made for key length and key type:
Type HEX ASCII
64-bit 10 Hexadecimal Characters
(0-9, A-F or a-f) Example:
00112233AA
5 ASCII Characters
Example:
ubnt1
128-bit 26 Hexadecimal Characters
(0-9, A-F or a-f) Example:
00112233445566778899AABBCC
13 ASCI characters
Example:
ubntproducts1
Key Index Specifies the Index of the WEP Key used. 4
different WEP keys can be configured at the same time,
but only one is used. The effective key is set by choosing 1,
2, 3 or 4.

Содержание

Похожие устройства

Скачать
Случайные обсуждения