Page 31 / 63 Scroll up to view Page 26 - 30
29
This section introduces the wireless LAN and some basic configurations. Wireless LANs can
be as simple as two computers with wireless LAN cards communicating in a peer-to-peer
network or as complex as a number of computers with wireless LAN cards communicating
through access points which bridge network traffic to the wired LAN.
Wireless LAN
Access Point:
Default setting is set to
Activated
.
If you do not have any wireless, both
802.11g is only supported for the 5200G
.
Page 32 / 63
30
802.11g and 802.11b, device in your network, select
Deactived.
SSID:
The SSID is the unique name of a wireless access point (AP) to be distinguished
from another.
For security propose, change the default
wlan-ap
to
a unique ID name to the
AP which is already built-in to the router’s wireless interface. It is case sensitive and must
not excess 32 characters. Make sure your wireless clients have exactly the SSID as the
device, in order to get connected to your network.
Broadcast SSID:
Select
Yes
to hide the SSID in so a station cannot obtain the SSID
through passive scanning. Select
No
to make the SSID visible so a station can obtain the
SSID through passive scanning.
Channel ID:
The range of radio frequencies used by IEEE 802.11b/g wireless devices is
called a channel. Select a channel from the drop-down list box.
Authentication Type:
To prevent unauthorized wireless stations from accessing data
transmitted over the network, the router offers highly secure data encryption, known as
WEP.&WPA. If you require high security for transmissions, there are two alternatives to
select from:
64-bit WEP and 128-bit WEP
. WEP 128 will offer increased security over WEP
64.
You can disable or enable with WPA or WEP for protecting wireless network. The default
type of wireless is
disabled
and to allow all wireless computers to communicate with the
access points without any data encryption
Advanced Setting
Beacon interval:
The Beacon Interval value indicates the frequency interval of the
beacon. Enter a value between 20 and 1000. A beacon is a packet broadcast by the Router
to synchronize the wireless network.
RTS/CTS Threshold:
The RTS (Request To Send) threshold (number of bytes) for
enabling RTS/CTS handshake. Data with its frame size larger than this value will perform
the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS/CTS handshake. Setting this attribute to zero turns
on the RTS/CTS handshake
Enter a value between 1500 and 2347..
Fragmentation Threshold:
The threshold (number of bytes) for the fragmentation
boundary for directed messages. It is the maximum data fragment size that can be sent.
Enter a value between 256 and 2346.
DMIT:
This value, between 1 and 255, indicates the interval of the Delivery Traffic
Indication Message (DTIM).
802.11b/g:
The default setting is
802.11b+g
(Mixed mode). If you do not know or have
both 11g and 11b devices in your network, then keep the default in
mixed mode
.
From the
drop-down manual, you can select
802.11g
if you have only 11g card.
If you have only 11b
card, then select
802.11b
.
Page 33 / 63
31
Wireless MAC Address Filter
The MAC filter screen allows you to configure the router to give exclusive access to up to 32
devices (Allow Association) or exclude up to 32 devices from accessing the router (Deny
Association). Every Ethernet device has a unique MAC (Media Access Control) address.
The MAC address is assigned at the factory and consists of six pairs of hexadecimal
characters, for example, 00:AA:BB:00:00:02. You need to know the MAC address of the
devices to configure this screen.
To change your router’s MAC filter settings, click Wireless LAN, MAC Filter to open the MAC
Filter screen. The screen appears as shown.
.
Active:
Select
Actived
to enable MAC address filtering.
Action:
Define the filter action for the list of MAC addresses in the MAC address filter
table.
Select
Deny Association
to block access to the router, MAC addresses not listed will be
allowed to access the router. Select
Allow Association
to permit access to the router, MAC
addresses not listed will be denied access to the router.
MAC Address:
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the
wireless station that are allowed or denied access to the router in these address fields.
WEP
Key 1 to Key 4:
Enter the key to encrypt wireless data. To allow encrypted data
transmission, the WEP Encryption Key values on all wireless stations must be the same as
the router. There are four keys for your selection. The input format is in HEX style, 5 and 13
HEX codes are required for 64-bitWEP and 128-bitWEP respectively.
If you chose
WEP 64-bits
, then enter any 5 ASCII characters or 10 hexadecimal characters
("0-9", "A-F").
If you chose
WEP 128-bits
, then enter 13 ASCII characters or 26 hexadecimal characters
("0-9", "A-F").
You must configure all four keys, but only one key can be activated at any one time. The
default key is key 1.
Page 34 / 63
32
WPA-PSK
Encryption:
TKIP (Temporal Key Integrity Protocol) utilizes a stronger encryption
method and incorporates Message Integrity Code (MIC) to provide protection against
hackers.
Pre-Shared key:
The key for
network authentication. The input format is in character
style and key size should be in the range between 8 and 64 characters.
Page 35 / 63
33
4.3 Advanced Setup
4.3.1 Routing
If you have another router with a LAN-to-LAN connection, you may create a static routing on
the router that is the gateway to Internet.
#:
Item number
Dest IP:
IP address of the destination network
Mask:
The destination mask address.
Gateway IP:
IP address of the gateway or existing interface that this route uses.
Metric:
It represents the cost of transmission for routing purposes. The number need not
be precise, but it must be between 1 and 15.
Device:
Media/channel selected to append the route.
Use:
Counter for access times.
Edit:
Edit the route; this icon is not shown for system default route.
Drop:
Drop the route; this icon is not shown for system default route.

Rate

4 / 5 based on 1 vote.

Popular BEC Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top