Configuration and Management
methods. Authentication is used to restrict access to the wireless network.
Encryption is the translation of data into a form that cannot be easily
understood by unauthorized users. The encrypted data can only be sent
and received by users with access to a private encryption key.
The following authentication methods are supported by the Ericsson W25:
WEP
WEP (Wired Equivalent Privacy) is considered to be a low security option.
The data is encrypted into blocks of either 64 bits length or 128 bits length.
The encrypted data can only be sent and received by users with access to
a private encryption key. Each device on your wireless network has to be
manually configured with the same key as the Ericsson W25 in order to
allow encrypted data transmissions.
WPA and WPA2
WPA (Wi-Fi Protected Access) and its successor WPA2 are considered to
be the most reliable security options. WPA encryption uses the Temporal
Key Integrity Protocol (TKIP) while WPA2 encryption follows the Advanced
Encryption Standard (AES). AES offers a higher level of security and is
approved for sensitive corporate and government data transmission.
WPA and WPA2 authentication require a passphrase. Each device on your
wireless network has to be manually configured with the same passphrase
as the Ericsson W25. The encryption master key is derived from the
passphrase and the network name (SSID) of the device.
The following Wireless LAN authentication details are displayed and can be
modified on the
Wireless LAN page:
The authentication method, which can be one of the
following:
Authentication
None
WEP (64 bit)
WEP (128 bit)
WPA
WPA2
The WEP 64-bit data encryption or 128-bit data
encryption key
Passphrase /
Key
or the WPA or WPA2 authentication
and encryption passphrase.
If this check box is selected, only wireless devices
added to the whitelist are allowed to access the
Ericsson W25.
Enable whitelist
5/1551-CRH 102 167 Uen Rev B 2007-02-01
35
Kommentare zu diesen Handbüchern