Vivotek PZ7111 Digital Camera User Manual


 
VIVOTEK - A Leading Provider of Multimedia Communication Solutions
42 - User's Manual
3�
WPA-PSK: Use WPA (Wi-Fi Protected Access) pre-shared key�
More secure than WEP, the Wi-Fi Alliance developed WPA (Wi-Fi Protected Access) in 2003 to
address WEP’s weaknesses� Improvements included TKIP, which changes the encryption key for each
data transmission�
Algorithm: Choosing one of the following algorithm for WPA-PSK and WPA2-PSK modes�
TKIP (Temporal Key Integrity Protocol): A security protocol used in the IEEE 802�11 wireless networks�
TKIP is a “wrapper” that goes around the existing WEP encryption� TKIP comprises the same
encryption engine and RC4 algorithm dened for WEP. However, the key used for encryption in TKIP
is 128 bits long. This solves the rst problem of WEP: a too-short key length. (From Wikipedia)
AES (Advanced Encryption Standard): In cryptography, the Advanced Encryption Standard (AES),
also known as Rijndael, is a block cipher adopted as an encryption standard by the U�S� government�
As of 2006, AES is one of the most popular algorithms used in symmetric key cryptography� (From
Wikipedia)
Pre-shared Key: Entering a key in ASCII format� The length of the key is 8 ~ 63�
4�
WPA2-PSK: Use WPA2 pre-shared key�
The advanced protocol, certied through Wi-Fi Alliance’s WPA2 program, implements the mandatory
elements of 802�11i� In particular, it introduces a new AES-based algorithm, CCMP, that is considered
fully secure. From March 13, 2006, WPA2 certication is mandatory for all new devices wishing to be
certied by the Wi-Fi Alliance as “Wi-Fi CERTIFIED.” (From Wikipedia)
NOTE
► After wireless congurations are completed, click Save and the camera will reboot� Wait for the live
image is reloaded to your browser� For VIVOTEK 7000-series cameras, you have to unplug the power
cable and Ethernet cable from the camera; then re-plug the power cable to the camera� The camera
will switch to wireless mode�
► Some invalid settings may cause the system failing to respond. Change the Conguration only if
necessary and consult with your network supervisor or experienced users for correct settings� Once
the system has lost contact, please refer to Maintenace on page 75 for reset and restore procedures�