523579
13
Zoom out
Zoom in
Previous page
1/44
Next page
PENTAGRAM horNet Wi-Fi PCI [P 6121-L7]
Profile configuration –Auth \ Encry tab.
On this tab you can configure the authentication and encryption parameters required for
connection with a secured wireless network. You must obtain this information from the wireless
network administrator. The tab layout depends on the value selected from the Authentication
list:
Open Connection to an open wireless network does not require authentication. Data in
such networks are not encrypted or the WEP protocol is used for encryption.
Shared Authentication is performed after the station submits the WEP key via a secure
channel (independent of the wireless communication channel 802.11). The WEP protocol is
used for encrypting data sent in such a network as well.
WPA (CCKM capable) and WPA2 (CCKM capable) (Windows 2000/XP); Authentication is
performed using an 802.1x protocol, and the TKIP and AES algorithms are (respectively)
used for encryption of transmitted data. They are safer than WEP encryption. CCKM capable
means that the CCKM (Cisco Central Key Management) function is supported. It enables
quick switching between wireless network access points based on Cisco network hardware.
WPA and WPA2 (Windows Vista/7); Authentication is performed using an 802.1x protocol,
and the TKIP and AES algorithms are (respectively) used for encryption of transmitted data.
They are safer than WEP encryption. These modes are incompatible with the CCKM (Cisco
Central Key Management) function, which enables quick switching between wireless
network access points based on Cisco network hardware.
WPA-PSK and WPA2-PSK Authentication is performed after the station submits the WPA
Preshared Key. The TKIP and AES algorithms are (respectively) used for encryption of
transmitted data. They are safer than WEP encryption. These modes are incompatible with
the CCKM (Cisco Central Key Management) function, which enables quick switching between
wireless network access points based on Cisco network hardware.
CCKM (Windows Vista/7); Authentication is performed using an 802.1x protocol. The
transmitted data are encrypted with (depending on the network settings) WEP, TKIP or AES
algorithms. This mode is compatible with the CCKM (Cisco Central Key Management)
function, which enables quick switching between wireless network access points based on
Cisco network hardware.
WAPI PSK Authentication is performed after the station submits the WAPI key. The
transmitted data are encrypted with the SMS4 algorithm. It is stronger than WEP encryption,
but not as strong as AES.
WAPI CERT – Authentication is performed using the authenticating server – ASU
(Authentication Service Unit). The transmitted data are encrypted with the SMS4 algorithm.
It is stronger than WEP encryption, but not as strong as AES.
13
13


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for PENTAGRAM P 6121-L7 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of PENTAGRAM P 6121-L7 in the language / languages: English as an attachment in your email.

The manual is 2,04 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info