Vivotek PZ7152 Spécifications Page 40

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 99
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 39
VIVOTEK - A Leading Provider of Multimedia Communication Solutions
40 - User's Manual
3.
WPA-PSK: Use WPA pre-shared key.
4.
WPA2-PSK: Use WPA2 pre-shared key.
Algorithm: Choosing one of the following algorithm for WPA-PSK and WPA2-PSK modes.
TKIP (Temporal Key Integrity Protocol): A security protocol used in the IEEE 802.11 wireless networks.
TKIP is a “wrapper” that goes around the existing WEP encryption. TKIP comprises the same
encryption engine and RC4 algorithm de ned for WEP. However, the key used for encryption in TKIP
is 128 bits long. This solves the rst problem of WEP: a too-short key length. (From Wikipedia)
AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES),
also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
It is expected to be used worldwide and analysed extensively, as was the case with its predecessor,
the Data Encryption Standard (DES). AES was announced by National Institute of Standards
and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) in November 26, 2001 after a 5-year
standardization process (see Advanced Encryption Standard process for more details). It became
effective as a standard May 26, 2002. As of 2006, AES is one of the most popular algorithms used in
symmetric key cryptography. (From Wikipedia)
Pre-shared Key: Entering a key in ASCII format. The length of the key is 8 ~ 63.
NOTE
After wireless con gurations are completed, click Save and the camera will reboot. Wait for the live
image is reloaded to your browser. For VIVOTEK 7000-series cameras, you have to unplug the power
cable and Ethernet cable from the camera; then re-plug the power cable to the camera. The camera
will switch to wireless mode.
Some invalid settings may cause the system failing to respond. Change the Con guration only if
necessary and consult with your network supervisor or experienced users for correct settings. Once
the system has lost contact, refer to Appendix A for reset and restore procedures.
Vue de la page 39
1 2 ... 35 36 37 38 39 40 41 42 43 44 45 ... 98 99

Commentaires sur ces manuels

Pas de commentaire