Page 86 / 130 Scroll up to view Page 81 - 85
85
Click
Import Certificate
to paste the certificate content of your trusted CA.
Generally speaking, the certificate content will be provided by your vendor/ISP/ITSP
and is used to authenticate the Auto-Configuration Server (ACS) that the CPE will
connect to.
Page 87 / 130
86
Chapter 7
Wireless
The Wireless dialog box allows you to enable the wireless capability, hide the access
point, set the wireless network name and restrict the channel set.
7.1 Basic
The Basic option allows you to configure basic features of the wireless LAN interface.
You can enable or disable the wireless LAN interface, hide the network from active
scans, set the wireless network name (also known as SSID) and restrict the channel
set based on country requirements.
Click
Save/Apply
to configure the basic wireless options.
Consult the table below for descriptions of these options.
Option
Description
Enable Wireless
A checkbox that enables or disables the wireless LAN interface.
When selected, the Web UI displays Hide Access point, SSID,
and County settings.
Wireless is enabled by default.
Page 88 / 130
87
Hide Access Point
Select Hide Access Point to protect the access point from
detection by wireless active scans.
If you do not want the
access point to be automatically detected by a wireless station,
this checkbox should be de-selected.
The station will not
discover this access point.
To connect a station to the
available access points, the station must manually add this
access point name in its wireless configuration.
In Windows
XP, go to the Network
Æ
Programs function to view all of the
available access points.
You can also use other software
programs such as NetStumbler to view available access points.
Clients Isolation
1.
Prevents clients PC from seeing one another in My Network
Places or Network Neighborhood.
2.
Prevents one wireless client communicating with another
wireless client.
Disable WMM
Advertise
Stops the router from ‘advertising’ its Wireless Multimedia
(WMM) functionality, which provides basic quality of service for
time-sensitive applications (e.g. VoIP, Video).
(wireless software version 3.10 and above)
SSID
Sets the wireless network name.
SSID stands for Service Set
Identifier.
All stations must be configured with the correct
SSID to access the WLAN.
If the SSID does not match, that
user will not be granted access.
The naming conventions are: Minimum is one character and
maximum number of characters: 32 bytes.
BSSID
The BSSID is a 48bit identity used to identify a particular BSS
(Basic Service Set) within an area. In Infrastructure BSS
networks, the BSSID is the MAC (Medium Access Control)
address of the AP (Access Point) and in Independent BSS or ad
hoc networks, the BSSID is generated randomly.
Country
A drop-down menu that permits worldwide and specific
national settings.
Each county listed in the menu enforces
specific regulations limiting channel range:
US= worldwide
Japan=1-14
Jordan= 10-13
Israel= 1-13
Max Clients
The maximum number of clients that can access the router.
Page 89 / 130
88
Wireless - Guest /
Virtual Access
Points
This router supports multiple SSIDs called Guest SSIDs or
Virtual Access Points.
To enable one or more Guest SSIDs
select the radio buttons under the
Enable
heading.
To hide a
Guest SSID select its radio button under the
Hidden
heading.
Do the same for
Isolate Client
and
Disable WMM Advertise
functions.
For a description of these two functions, see the
entries for “Clients Isolation” and “Disable WMM Advertise” in
this table.
Similarly, for
Max Clients
and
BSSID
headings,
consult the matching entries in this table.
NOTE:
Remote wireless hosts are unable to scan Guest SSIDs.
Page 90 / 130
89
7.2 Security
Security options include authentication and encryption services based on the wired
equivalent privacy (WEP) algorithm.
WEP is a set of security services used to
protect 802.11 networks from unauthorized access, such as eavesdropping; in this
case, the capture of wireless network traffic.
When data encryption is enabled,
secret shared encryption keys are generated and used by the source station and the
destination station to alter frame bits, thus avoiding disclosure to eavesdroppers.
802.11 supports two subtypes of network authentication services: open system and
shared key.
Under open system authentication, any wireless station can request
authentication.
The system that needs to authenticate with another wireless
station sends an authentication management frame that contains the identity of the
sending station.
The receiving station then sends back a frame that indicates
whether it recognizes the identity of the sending station.
Under shared key authentication, each wireless station is assumed to have received
a secret shared key over a secure channel that is independent from 802.11 wireless
network communications channel.
The following screen appears when Security is selected. The Security page allows
you to configure security features of the wireless LAN interface. You can set the
network authentication method, selecting data encryption, specify whether a
network key is required to authenticate to this wireless network and specify the
encryption strength.
Click
Apply
to configure the wireless security options.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top