Key Details
Keys can be entered by using hexadecimal (base 16), decimal (base 10), or binary (base 2). Keys are written similar to filter IP addresses.
Keys must fall on 8-bit boundaries. Some protocols only allow specific key lengths, while others allow a range of lengths. When keys are stored or displayed, they are in hexadecimal format.