Page 26 / 71 Scroll up to view Page 21 - 25
±³
D-Link DWL-3150 User Manual
Section ² - Using the Configuration Menu
WPA & WPA2 Enterprise
Wi-Fi Protected Access authorizes and
authenticates users onto the wireless
network. WPA uses stronger security than
WEP and is based on a key that changes
automatically at a regular interval. It requires
a RADIUS server in the network. WPA and
WPA2 uses different algorithm. WPA-Auto
allows both WPA and WPA2.
S
elect TLS, TTLS or PEAP from the pull-down
menu.
S
elect TKIP or AES from the pull-down
menu.
Client and server authenticate each other
using digital certificates. Client generates
a pre-master secret key by encrypting a
random number with the server’s public key
and sends it to the server.
Certificate Authority (Ex: Microsoft
Certification, Bank Certification…etc).
Client Authentication (Ex: The certification
from Radius Server use in client device).
EAP private key data use in wireless
connection.
Authentication:
EAP Type:
Cipher Type:
EAP Secret:
CA Certification:
Client Certification:
Private Key
Certification:
Page 27 / 71
±´
D-Link DWL-3150 User Manual
Section ² - Using the Configuration Menu
Wireless WAN > Static IP
Choose Static IP if you have a static IP
subscription from WISP.
Enter the IP address assigned by
WISP.
Enter the subnet mask.
Enter the gateway IP address, typically
a router.
Enter the MAC address of the network
device you are configuring a DHCP
Reservation for.
Copy the MAC address of the network
device you are configuring a DHCP
Reservation for.
Enter your primary DNS IP address.
Enter your secondary DNS IP address.
Internet Connection
Type:
IP Address:
Subnet Mask:
ISP Gateway
Address:
MAC Address:
Clone MAC Address:
Primary DNS
Server:
Secondary DNS
Server:
Page 28 / 71
±µ
D-Link DWL-3150 User Manual
Section ² - Using the Configuration Menu
No Security
For added security on a wireless network,
data encryption can be enabled. There
are several available Authentications
type can be selected.
Select Disable if you choose to not have
security
.
Authentication:
Encryption:
Page 29 / 71
±¶
D-Link DWL-3150 User Manual
Section ² - Using the Configuration Menu
Open System (64 Bits or 128 Bits)
For Open System authentication, only
the wireless clients with the same
WEP key will be able to communicate
on the wireless network. The bridge
will remain visible to all devices on
the network.
Select Enabled to enable WEP
encryption.
Select HEX or ASCII.
Select 64 Bits or 128 Bits.
Select the 1st through the 4th key to
be the active key.
Input up to four keys for encryption.
You will select one of these keys in the
valid key field.
Note:
Hexadecimal digits consist of the numbers 0-9 and the letters A-F.
ASCII (American Standard Code for Information Interchange) is a code for representing English letters as
numbers 0-127.
Authentication:
Encryption:
Key Type:
Key Size:
Valid Key:
First through
Fourth Key:
Page 30 / 71
30
D-Link DWL-3150 User Manual
Section ² - Using the Configuration Menu
Shared Key (64 Bits or 128 Bits)
For Shared Key authentication, the
bridge cannot be seen on the wireless
network except to the wireless clients
that share the same WEP key.
Select Enabled to enable WEP
encryption.
Select HEX or ASCII.
Select 64 Bits or 128 Bits.
Select the 1st through the 4th key to
be the active key.
Input up to four keys for encryption.
You will select one of these keys in the
valid key field.
Note:
Hexadecimal digits consist of the numbers 0-9 and the letters A-F.
ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers
0-127.
Authentication:
Encryption:
Key Type:
Key Size:
Valid Key:
First through
Fourth Key:

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top