Page 71 / 100 Scroll up to view Page 66 - 70
71
D-Link DAP-1522 User Manual
Section 3 - Configuration
There are three types of logs that can be viewed:
System Activity, Wireless Activity, and Notice. Click
on
the corresponding check box for the type(s) that
you want displayed in the log.
Select this check box and enter a Log Server name
or IP address to enable the remote log feature.
Click this button to immediately filter the log results
so that only the selected options appear in the Log
Details section of this screen.
Updates the log details on the screen so it displays
any recent activity.
This option clears all of the log contents.
This option will save the access point to a log file
on your computer.
What to View:
Enable
Remote Log:
Apply Log
Settings Now:
Refresh:
Clear:
Save Log:
Logs
The access point automatically logs (records) events of possible interest in its internal memory. If there isn’t enough
internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs
option allows you to view the access point logs. You can define what types of events you want to view and the level
of the events to view. This access point also has external Syslog Server support so you can send the log files to a
computer on your network that is running a Syslog utility.
Page 72 / 100
72
D-Link DAP-1522 User Manual
Section 3 - Configuration
Help
Page 73 / 100
73
D-Link DAP-1522 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DAP-1522 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When
using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal -
using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change keys easily.
Page 74 / 100
74
D-Link DAP-1522 User Manual
Section 4 - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless bridge or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
Page 75 / 100
75
D-Link DAP-1522 User Manual
Section 4 - Security
Configure WEP in AP Mode
It is recommended to enable encryption on your wireless access point before your wireless network adapters. Please
establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption
due to the added overhead.
1. Log into the web-based configuration by opening a web browser and entering the IP address of the access point
(192.168.0.50).
Click on
Setup
and then click
Wireless Settings
on the left side.
2. Next to Security Mode in the Wireless Security Mode
section, select
WEP
.
3. Next to WEP Key Length in the WEP section, select both the type
of input (hexidecimal or ASCII) and the level of encryption (64-
bit or 128-bit). Hex - (recommended) Letters A-F and numbers 0-9
are valid.
4. Next to Default WEP Key and the first selection on the
drop-down menu, WEP Key 1. Enter a WEP key that you create in the WEP Key value and Verify WEP Key value
fields. Make sure you enter this key exactly on all your wireless devices. You may enter up to 4 different keys using
the Default WEP Key drop-down menu.
5. Next to
Authentication
, select
Open
or
Shared Key
.
6. Click
Save Settings
at the top of the window to save your settings. If you are configuring the access point with a
wireless adapter, you will lose connectivity until you enable WEP on your adapter and enter the same WEP key as
you did on the access point.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top