Page 56 / 106 Scroll up to view Page 51 - 55
Using the Web-Based Advanced User Interface
54
Setting up WPA for Wireless Desktop and Wireless Notebook
Cards that are NOT Manufactured by Ativa
If you do NOT have an Ativa Wireless G Notebook Card and it is not equipped
with WPA-enabled software, a file from Microsoft called
“Windows XP Support Patch for Wireless Protected Access” is available for free
download.
Please note:
The file that Microsoft has made available works only with
Windows XP. Other operating systems are not supported at this time.
Important:
You also need to ensure that the wireless card manufacturer
supports WPA and that you have downloaded and installed the latest driver
from their support site.
Supported Operating Systems:
• Windows XP Professional
• Windows XP Home Edition
Setting up Windows XP Wireless Network Utility to
use WPA-PSK
In order to use WPA-PSK, ensure you are using the Windows Wireless Network
Utility by doing the following:
1.
Under Windows XP, click “Start > Control Panel > Network Connections”.
2.
Right-click on “Wireless Network Connection Properties”, and
select “Properties”.
3.
Clicking on the “Wireless Networks” tab will display the following screen.
Ensure the “Use Windows to configure my wireless network settings” box
is checked.
Page 57 / 106
55
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
4.
Under the “Wireless Networks” tab, click the “Configure” button and
you will see the following screen.
5.
For a home or small business user, select “WPA-PSK” under
“Network Authentication”.
Note:
Select “WPA” if you are using this computer to connect to a
corporate network that supports an authentication server such as a
radius server. Please consult your network administrator for
further information.
6.
Select “TKIP” or “AES” under “Data Encryption”. This setting will have to
be identical to the Router that you set up.
7.
Type your encryption key in the “Network key” box.
Important:
Enter your pre-shared key. This can be from eight to 63
characters and can be letters, numbers, or symbols. This same key must be
used on all of the clients that you set up.
8.
Click “OK” to apply settings.
Page 58 / 106
Using the Web-Based Advanced User Interface
56
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced users only.
The Router can be configured to work as a wireless network access point.
Using this mode will defeat the NAT IP sharing feature and DHCP server.
In Access Point (AP) mode, the Router will need to be configured with an
IP address that is in the same subnet as the rest of the network that you
will bridge to. The default IP address is 192.168.2.254 and subnet mask is
255.255.255.0. These can be customized for your need.
1.
Enable the AP mode my selecting “Enable” in the “Use as Access Point
only” page. When you select this option, you will be able to change the
IP settings.
2.
Set your IP settings to match your network. Click “Apply Changes”.
3.
Connect a cable from the WAN port on the Router to your
existing network.
The Router is now acting as an access point. To access the Router’s
Web-Based Advanced User Interface again, type the IP address you specified
into your browser’s navigation bar. You can set the encryption settings, MAC
address filtering, SSID, and channel normally.
Page 59 / 106
57
2
1
3
4
5
6
7
8
9
10
section
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from
a wide array of common hacker attacks including:
• IP Spoofing
• SYN flood
• Land Attack
• UDP flooding
• Ping of Death (PoD)
• Tear Drop Attack
• Denial of Service (DoS)
• ICMP defect
• IP with zero length
• RIP defect
• Smurf Attack
• Fragment flooding
• TCP Null Scan
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth”, meaning that for all intents and
purposes, they do not exist to a would-be hacker. You can turn the firewall
function off if needed; however, it is recommended that you leave the
firewall enabled. Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you
leave the firewall enabled.
Page 60 / 106
Using the Web-Based Advanced User Interface
58
Configuring Internal Forwarding Settings
The “Virtual Servers” function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network. Since your
internal computers are protected by a firewall, computers outside your
network (over the Internet) cannot get to them because they cannot be
“seen.” A list of common applications has been provided in case you need to
configure the “Virtual Server” function for a specific application. You will need
to contact the application vendor to find out which port settings you need.
Entering Settings into the Virtual Server
To enter settings, enter the IP address in the space provided for the internal
(server) machine, the port(s) required to pass, select the port type (TCP or
UDP), and click “Apply Changes”. Each inbound port entry has two fields with
five characters maximum per field that allows a start and end port range, e.g.
[xxxxx]-[xxxxx]. For each entry, you can enter a single port value by filling in
the two fields with the same value (e.g. [7500]-[7500]) or a wide range of ports
(e.g. [7500]-[9000]). If you need multiple single port values or a combination of
ranges and a single value, you must use multiple entries up to the maximum of
20 entries (e.g. 1. [7500]-[7500], 2. [8023]-[8023], 3. [9000]-[9000]). You can only
pass one port per internal IP address. Opening ports in your firewall can pose a
security risk. You can enable and disable settings very quickly. It is recommended
that you disable the settings when you are not using a specific application.

Rate

3.5 / 5 based on 2 votes.

Popular Ativa Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top