Page 26 / 73 Scroll up to view Page 21 - 25
WL-308 Gaming Router
Full Manual
26
Wireless
These options allow you to enable/disable the wireless interface, switch between
the 11n, 11b/g and 11b radio band and channel frequency
°
Enable Wireless:
Place a check in this box to enable the wireless interface.
It is enabled by default.
°
Wireless Network Name
: The SSID is a unique named shared amongst all
the points of the wireless network. The SSID must be identical on all points of
the wireless network and cannot exceed 32 characters.
°
802.11 Mode
: Select the IEEE 802.11 mode from the drop-down list. For
example, if you are sure that the wireless network will be using only IEEE
802.11g clients, then it is recommended to select
802.11g
only instead of
2.4 GHz
B+G
, which will reduce the performance of the wireless network.
You may also select
Mixed 802.11n, 802.11g and 802.11b
. If all of the
wireless devices you want to connect with this router can connect in the same
transmission mode, you can improve performance slightly by choosing the
appropriate "Only" mode. If you have some devices that use a different
transmission mode, choose the appropriate "Mixed" mode.
°
Wireless Channel
: Select a channel from the drop-down list. The channels
available are based on the country’s regulation. A wireless network uses
specific channels in the wireless spectrum to handle communication between
clients. Some channels in your area may have interference from other
electronic devices. Choose the clearest channel to help optimize the
performance and coverage of your wireless network.
°
Transmission Rate
: Select a transmission rate from the drop-down list. It is
recommended to use the
Best (automatic)
option.
°
Channel Width
: Select a channel width from the drop-down list.
°
Visibility Status
: Select
Visible
or
Invisible
. This is the SSID broadcast
feature. When this option is set to Visible, your wireless network name is
broadcast to anyone within the range of your signal. If you're not using
Page 27 / 73
WL-308 Gaming Router
Full Manual
27
encryption then they could connect to your network. When Invisible mode is
enabled, you must enter the Wireless Network Name (SSID) on the client
manually to connect to the network.
Click on the
Apply
button to store these settings.
Wireless Security Mode
To protect your privacy this router supports several types of wireless security:
WEP WPA, WPA2, and WPA-Mixed. WEP is the original wireless encryption
standard. WPA provides a higher level of security. The following section describes
the security configuration in detail.
WEP (Wired Equivalent Privacy)
Select the
WEP
radio button if your wireless network uses WEP encryption. WEP
is an acronym for Wired Equivalent Privacy, and is a security protocol that
provides the same level of security for wireless networks as for a wired network.
WEP is not as secure as WPA encryption. To gain access to a WEP network, you
must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption
determines the key length. 128-bit encryption requires a longer key than 64-bit
encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information
Interchange - alphanumeric characters) format. ASCII format is provided so you
can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change
keys easily. A default key is selected for use on the network.
°
WEP Key Length
: Select a
64-bit
or
128-bit
WEP key length from the drop-
down list.
°
WEP Key 1-4:
You may enter four different WEP keys.
°
Default WEP Key:
You may use up to four different keys for four different
networks. Select the current key that will be used.
Page 28 / 73
WL-308 Gaming Router
Full Manual
28
°
Authentication:
Select
Open
, or
Shared Key
. Authentication method from
the drop-down list. An open system allows any client to authenticate as long
as it conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends
an unencrypted challenge text string to any device attempting to
communicate with the AP. The device requesting authentication encrypts the
challenge text and sends it back to the access point. If the challenge text is
encrypted correctly, the access point allows the requesting device to
authenticate. It is recommended to select Auto if you are not sure which
authentication type is used.
Click on the
Apply
button to store these settings.
WPA Personal (Wi-Fi Protected Access)
Select the
WPA-Personal
radio button if your wireless network uses WPA
encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the
security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol
(TKIP), which scrambles the keys using a hashing algorithm and by adding an
integrity checking feature which makes sure that keys haven’t been tampered
with.
°
WPA Mode
: Select the
Auto
WPA / WPA2
from the drop-down list.
°
Cipher Type
: Select
TKIP and AES
as the cipher suite. The encryption
algorithm used to secure the data communication.
Page 29 / 73
WL-308 Gaming Router
Full Manual
29
o
TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides
per-packet key generation and is based on WEP.
o
AES. Use AES only. AES (Advanced Encryption Standard) is a very
secure block based encryption. Note that, if the bridge uses the AES
option, the bridge can associate with the access point only if the
access point is also set to use only AES.
o
TKIP and AES. The bridge negotiates the cipher type with the access
point, and uses AES when available.
°
Group Key Update Interval
: Specify the number of seconds before the
group key used for broadcast and multicast data is changed.
°
Pre-Shared Key
: The key is entered as a pass-phrase of up to 63
alphanumeric characters in ASCII (American Standard Code for Information
Interchange) format at both ends of the wireless connection. It cannot be
shorter than eight characters, although for proper security it needs to be of
ample length and should not be a commonly known phrase. This phrase is
used to generate session keys that are unique for each wireless client.
Click on the
Apply
button to store these settings.
WPA Enterprise (Wi-Fi Protected Access & 802.1x)
Select the WPA-Enterprise radio button if your wireless network uses WPA
encryption. WPA (Wi-Fi Protected Access) was designed to improve upon the
security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol
(TKIP), which scrambles the keys using a hashing algorithm and by adding an
integrity checking feature which makes sure that keys haven’t been tampered
with.
This option works with a RADIUS Server to authenticate wireless clients. Wireless
clients should have established the necessary credentials before attempting to
authenticate to the Server through this Gateway. Furthermore, it may be
necessary to configure the RADIUS Server to allow this Gateway to authenticate
users.
°
WPA Mode
: Select the WPA / WPA2 from the drop-down list.
°
Cipher Type
: Select TKIP or AES as the cipher suite. The encryption
algorithm used to secure the data communication.
Page 30 / 73
WL-308 Gaming Router
Full Manual
30
o
TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides
per-packet key generation and is based on WEP.
o
AES. Use AES only. AES (Advanced Encryption Standard) is a very
secure block based encryption. Note that, if the bridge uses the AES
option, the bridge can associate with the access point only if the
access point is also set to use only AES.
o
TKIP and AES. The bridge negotiates the cipher type with the access
point, and uses AES when available.
°
Group Key Update Interval
: Specify the number of seconds before the
group key used for broadcast and multicast data is changed.
°
Authentication Timeout
: Specify the number of minutes after which the
client will be required to re-authenticate.
°
RADIUS Server IP Address
: Specify the IP address of the RADIUS server.
°
RADIUS Server Port
: Specify the port number of the RADIUS server, the
default port is 1812.
°
RADIUS Server Shared Secret
: Specify the pass-phrase that is matched on
the RADIUS Server.
°
MAC Address Authentication:
Place a check in this box if you would like the
user to always authenticate using the same computer.
°
Optional Backup RADIUS server
: This option enables configuration of an
optional second RADIUS server. A second RADIUS server can be used as
backup for the primary RADIUS server. The second RADIUS server is
consulted only when the primary server is not available or not responding.
Click on the
Apply
button to store these settings.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top