Page 31 / 47 Scroll up to view Page 26 - 30
Wireless Broadband Router
User manual
4.4.2 Security
This wireless router provides complete wireless LAN security functions; include WEP, WPA with pre-shared
key and WPA2 with pre-shared key. With these security functions, you can prevent your wireless LAN from
illegal access. Please make sure your wireless stations use the same security function.
4.4.2.1 None
Transmit data without encryption and authentication. This is the default option.
If you select none, any data will be transmitted without Encryption and any station can access the
wireless router.
4.4.2.2 WEP
WEP (Wired Equivalent Privacy) is an encryption method used to protect your wireless data communications.
WEP uses a combination of 64-bit or 128-bit keys to provide access control to your network and encryption
security for every data transmission.
Page 31 of 47
Page 32 / 47
Wireless Broadband Router
User manual
z
Open-System
: No authentication is used. But uses WEP encrypt data packets.
z
Share-keys
: Authentication is a process in which the AP validates whether the wireless client is
qualified to access the AP’s service. You must enable WEP function and define your WEP keys. The
keys are used both to authenticate wireless clients and encrypt outgoing data.
z
Auto-Select
: It can detect Wireless Client authentication information, and automatically choose
Open-System or Share-Keys mode to communicate with client. When use Auto-Select mode, you must
setup WEP keys which are used by authentication system.
z
WEP Length
: Selects 64-bit or 128-bit WEP encryption. Be sure that the key length setting in the AP
shall be the same as in wireless clients, or the communication will not work.
z
WEP Mode
: You may select to select ASCII Characters or Hexadecimal Digits (in the "A-F", "a-f" and
"0-9" range) to be the WEP Key.
z
Default Key
: The Key selected here must match the key selected in the client. For example, if you
select Key 1 here you have to select Key 1 for the client. The default is 1.
z
Key 1~4
: Enter one to four WEP keys in either ASCII or Hexadecimal format. You can use 64 bits or 128
bits as the encryption algorithm.
Enter one to four WEP keys in either ASCII or Hexadecimal format. You can use 64 bits or 128 bits as
the encryption algorithm.
Note that when using Hexadecimal format, only digits 0-9 and letters A-F, a-f are allowed. Valid key
length for each encryption type is as below:
Key Length
HEX Format
ASCII Format
64 Bit
10 hexadecimal digits
5 ASCII characters
128 Bit
26 hexadecimal digits
13 ASCII characters
Click “Apply” at the bottom of the screen to save the above configurations.
4.4.2.3 WPA Personal
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to
authenticate wireless stations and encrypt data during communication. It uses TKIP and AES to change the
encryption key frequently. This can improve security very much.
Page 32 of 47
Page 33 / 47
Wireless Broadband Router
User manual
z
TKIP
: Temporal Key Integrity Protocol (TKIP) utilizes a stronger encryption algorithm and includes
Message Integrity Code (MIC) to provide protection against hackers.
z
AES
: Advanced Encryption System (AES) utilizes a symmetric 128-Bit block data encryption. It’s the
strongest encryption currently available.
z
WPA Pass Phrase
: The WPA Pass Phrase is used to authenticate and encrypt data transmitted in the
wireless network. The input format is in character style and key size should be in the range between 8
and 63 characters.
z
Rekey Time (sec)
: Specifies the timer the WPA key must changes. The change is done automatically
between the server and the client. The default value is 86400.
Click “Apply” at the bottom of the screen to save the above configurations.
4.4.2.4 WPA2 Personal
The WPA2 is a stronger version of WPA. You can use a pre-shared key to authenticate wireless stations and
encrypt data during communication. It uses AES to change the encryption key frequently. This can improve
security very much.
z
AES
: Advanced Encryption System (AES) utilizes a symmetric 128-Bit block data encryption. It’s the
Page 33 of 47
Page 34 / 47
Wireless Broadband Router
User manual
strongest encryption currently available.
z
WPA2 Personal
: The WPA Pass Phrase is used to authenticate and encrypt data transmitted in the
wireless network. The input format is in character style and key size should be in the range between 8
and 63 characters.
z
Rekey Time (sec)
: Specifies the timer the WPA key must changes. The change is done automatically
between the server and the client. The default value is 86400.
Click “Apply” at the bottom of the screen to save the above configurations.
4.4.2.5 WPA&WPA2 Personal
Auto-Select WPA/WPA2 can detect Wireless Client authentication information, and automatically choose
WPA or WPA2 mode to communicate with client. Operation is the same as WPA or WPA2.
Click “Apply” at the bottom of the screen to save the above configurations.
4.4.3 Filter List
This Wireless router has the capability to control the wireless client access based on the MAC address of the
wireless client. The user has the flexibility to customize your own control policy based on these options:
Page 34 of 47
Page 35 / 47
Wireless Broadband Router
User manual
z
Enable Wireless Access Control
: To enable Wireless MAC Filter, select the checkbox in front of
“Enable Wireless Access Control”, then click the “Apply “ button. The default is “disable”.
z
You can choose a default operation for your factual security or management consideration:
Defined items in MAC list are PERMIT to connect AP, others are DENIED.
Defined items in MAC list are DENIED to connect AP, others are PERMIT.
Click “Apply” when you have selected,
z
MAC
: Enter the MAC Address of a station.
z
Description
: Enter the Comment of station.
z
Click "Add”, then this wireless station will be added into the” Current Access Control List" below.
z
If you want to remove some MAC address, select them from the list and then click "Delete ".
4.4.4 WDS
You can set the wireless Bridge MAC here. This mode is used to connect two or more WRT-416 or
WAP-4036 wirelessly.
z
Wireless Bridge MAC:
If the operating mode of your WRT-416 is "WDS" or "AP+WDS", you should
have a setting in Wireless Bridge MAC. Enter the MAC address of target access point. Moreover, the
target access point must be "WDS" or "AP+WDS" as well.
z
Description:
Enter the Comment of station.
z
Current Wireless Bridge Information:
You can see the basic information of all wireless bridge devices.
And you can delete any wireless bridge in the list.
Page 35 of 47

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top