![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/8/df/8dfe4832-b438-4e2d-b584-2ea2ca6a9a01/8dfe4832-b438-4e2d-b584-2ea2ca6a9a01-bgbe.png)
MC9000-G with Windows
®
Mobile 2003 Software for Pocket PCs PRG
5-8
If an AP is set to 40-bit and a mobile computer is set to 128-bit the mobile computer can
associate with the AP, but no data transmission and reception can take place.
7. Select one of the following Encryption options from the Algorithm: drop-down list:
Open System
(no encryption)
Use the Open System option as the default setting when no data
packet encryption is needed over the network. Selecting Open
System provides no security for the data being transmitted over the
network.
40-bit Shared Key Select 40-bit encryption and enter a 10-digit hex encryption key. Tap
Reset Keys to set the encryption key to the default values.
128-bit Shared Key Select 128-bit encryption and enter a 26-digit hex encryption key. The
128-bit encryption option provides a higher level of security than 40-
bit encryption while maintaining an 11 Mbps data rate. Tap Reset
Keys to set the encryption key to the default values.
Note: The default hex digit keys are visible any time they are used.
As a security precaution after setting the key values for the network,
the digits are replaced with asterisks * within the encryption key
fields.
If the associated AP is using an optional Passkey, the "active"
mobile computer profile is required to use one as well. The Passkey
is a plain text representation of the WEP keys displayed in the
Encryption tab. The Passkey provides an easy way to enter WEP key
data without having to remember the entire 40-bit (10 character) or
128-bit (26 character) hex digit string.
Tap Passkey to display the Passkey window. Enter an easy-to-
remember 4 to 26 character string to be used as the WEP algorithm.
Tap OK. The AP transforms the Passkey string into a set of four WEP
keys using MD5 algorithms and displays them in the WEP fields.
These are the new WEP keys for the mobile computer profile. Once
displayed in the WEP key fields, the adapter profile behaves as if the
keys were entered manually.
Kerberos Kerberos is a different form of 128-bit data security whereby a mobile
computer is required to have its request for AP resources
authenticated with a Kerberos server before the server permits the
AP to transmit and receive data with the associated mobile computer.