Page 41 / 76 Scroll up to view Page 36 - 40
40
5.11
Certificate
A certificate is a public key, attached with its owner’s information (company name,
server name, personal real name, contact e-mail, postal address, etc) and digital
signatures.
There will be one or more digital signatures attached to the certificate,
indicating that these entities have verified that this certificate is valid.
5.11.1
Local
CREATE CERTIFICATE REQUEST
Click
Create Certificate Request
to generate a certificate-signing request.
The certificate-signing request can be submitted to the vendor/ISP/ITSP to apply for
a certificate.
Some information must be included in the certificate-signing request.
Your vendor/ISP/ITSP will ask you to provide the information they require and to
provide the information in the format they regulate.
Enter the required information
and click
Apply
to generate a private key and a certificate-signing request.
Page 42 / 76
41
The following table is provided for your reference.
Field
Description
Certificate Name
A user-defined name for the certificate.
Common Name
Usually, the fully qualified domain name for the machine.
Organization Name
The exact legal name of your organization.
Do not abbreviate.
State/Province Name
The state or province where your organization is located.
It cannot be abbreviated.
Country/Region Name
The two-letter ISO abbreviation for your country.
IMPORT CERTIFICATE
Click
Import Certificate
to paste the certificate content and the private key
provided by your vendor/ISP/ITSP into the corresponding boxes shown below.
Enter a certificate name and click
Apply
to import the local certificate.
Page 43 / 76
42
5.11.2
Trusted CA
CA is an abbreviation for Certificate Authority, which is a part of the X.509 system.
It is itself a certificate, attached with the owner information of this certificate
authority; but its purpose is not encryption/decryption.
Its purpose is to sign and
issue certificates, in order to prove that these certificates are valid.
Click
Import Certificate
to paste the certificate content of your trusted CA.
The
CA certificate content will be provided by your vendor/ISP/ITSP and is used to
authenticate the Auto-Configuration Server (ACS) that the CPE will connect to.
Enter a certificate name and click
Apply
to import the CA certificate.
Page 44 / 76
43
Chapter 6
Wireless
The Wireless menu provides access to the wireless options discussed below.
6.1
Basic
The Basic option allows you to configure basic features of the wireless LAN interface.
You can enable or disable the wireless LAN interface, hide the network from active
scans, set the wireless network name (also known as SSID) and restrict the channel
set based on country requirements.
Click
Save/Apply
to apply the selected wireless options.
Consult the table below for descriptions of these options.
Option
Description
Enable
Wireless
A checkbox
;
that enables or disables the wireless LAN interface.
When selected, a set of basic wireless options will appear.
Hide Access
Point
Select Hide Access Point to protect the access point from detection
by wireless active scans. To check AP status in Windows XP, open
Network Connections
from the
start
Menu and select
View
Available Network Connections
. If the access point is hidden, it
will not be listed there. To connect a client to a hidden access point,
the station must add the access point manually to its wireless
configuration.
Page 45 / 76
44
Option
Description
Clients
Isolation
When enabled, it prevents client PCs from seeing one another in My
Network Places or Network Neighborhood. Also, prevents one
wireless client communicating with another wireless client.
Disable WMM
Advertise
Stops the router from ‘advertising’ its Wireless Multimedia (WMM)
functionality, which provides basic quality of service for
time-sensitive applications (e.g. VoIP, Video).
SSID
[1-32
characters]
Sets the wireless network name. SSID stands for Service Set
Identifier.
All stations must be configured with the correct SSID to
access the WLAN.
If the SSID does not match, that user will not be
granted access.
BSSID
The BSSID is a 48-bit identity used to identify a particular BSS
(Basic Service Set) within an area.
In Infrastructure BSS
networks, the BSSID is the MAC (Media Access Control) address of
the AP (Access Point); and in Independent BSS or ad hoc networks,
the BSSID is generated randomly.
Country
A drop-down menu that permits worldwide and specific national
settings.
Local regulations limit channel range:
US= worldwide, Japan=1-14, Jordan= 10-13, Israel= 1-13
Max Clients
The maximum number of clients that can access the router.
Wireless -
Guest /
Virtual
Access Points
This router supports multiple SSIDs called Guest SSIDs or Virtual
Access Points.
To enable one or more Guest SSIDs select the
checkboxes
;
in the
Enabled
column.
To hide a Guest SSID select
its checkbox
;
in the
Hidden
column.
Do the same for
Isolate Clients
and
Disable WMM Advertise
.
For a description of these two functions, see the previous entries for
“Clients Isolation” and “Disable WMM Advertise”.
Similarly, for
Max Clients
and
BSSID
, consult the matching entries in this table.
NOTE:
Remote wireless hosts cannot scan Guest SSIDs.
6.2
Security
The following screen appears when Wireless Security is selected.
The options
shown here allow you to configure security features of the wireless LAN interface.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top