Page 76 / 106 Scroll up to view Page 71 - 75
76
HITRON BVW-3653 USER’S GUIDE
WIRELESS
Security Mode
Select the type of security that you want to use.
±
Select
None
to use no security. Anyone in the
coverage area can enter your network.
±
Select
WEP
to use the Wired Equivalent Privacy
security protocol.
±
Select
WPA-Personal
to use the WiFi Protected
Access (Personal) security protocol.
NOTE:
Due to inherent security vulnerabilities, it is
suggested that you use
WEP
only if it is the only
security protocol your wireless clients support.
Under almost all circumstances, you should use
WPA-Personal
.
WEP Settings
NOTE:
These fields are only configurable when you select
WEP
from the
Security
Mode
list.
WEP Key Length
Use this field to specify the length of the security key
used to allow wireless devices to join the network. The
longer the key, the more secure it is.
±
Select
64-bit
to use a ten-digit security key.
±
Select
128-bit
to use a twenty-six-digit security key.
WEP Key 1~4
Use these fields to define the security keys that all
wireless devices on the network must use to join the
network.
The BVW-3653 supports up to four WEP keys, of which
you can select one as the default. You should input the
same four keys, in the same order, in your network’s
wireless clients. Your BVW-3653 and your wireless
clients can use different default keys, as long as all four
keys are present and in the same order. If your wireless
client supports only a single WEP key, use the BVW-
3653’s default key.
Enter the keys in hexadecimal format (using the digits
0
~
9
and the letters
A
~
F
).
Default WEP Key
Select the number of the security key that you want the
BVW-3653 to use as its default authentication key for
transmissions.
TABLE 29:
The Wireless > Security Screen (continued)
Page 77 / 106
77
HITRON BVW-3653 USER’S GUIDE
WIRELESS
Authentication
Select the authentication mode that you want to use:
±
Select
Open System
to allow wireless clients to
authenticate (identify themselves) to the BVW-3653
before presenting their security credentials (WEP
keys).
±
Select
Shared Key
to use the WEP key in the
authentication process. When a client wants to
associate, the BVW-3653 sends an unencrypted
challenge message. The client must use the WEP
key to encrypt the challenge message and return it to
the BVW-3653, which then decrypts the message
and compares the result with its original message.
Open System
authentication is the more secure of the
two authentication types, since while the
Shared Key
system appears more robust, it is possible to derive
secure data by capturing the challenge messages.
±
Select
Automatic
to have the BVW-3653 choose the
authentication method.
WPA_Personal
NOTE:
These fields are only configurable when you select
WPA-Personal
from the
Security Mode
list.
WPA Mode
Select the type of WPA security that you want to use:
±
Select
WPA-PSK
to use Wifi Protected Access (Pre-
Shared Key) mode
±
Select
WPA2-PSK
to use Wifi Protected Access 2
(Pre-Shared Key) mode
±
Select
Auto (WPA-PSK or WPA2-PSK)
to allow
clients operating in either mode to connect to the
BVW-3653.
Cipher Type
Select the type of encryption that you want to use:
±
Select
TKIP
to use the Temporal Key Integrity
Protocol.
±
Select AES to use the Advanced Encryption
Standard.
±
Select TKIP and AES to allow clients using either
encryption type to connect to the BVW-3653.
Group Key Update
Interval
Enter the frequency (in seconds) with which you want
the BVW-3653 to create new pre-shared keys, and
issue them to the wireless client.
TABLE 29:
The Wireless > Security Screen (continued)
Page 78 / 106
78
HITRON BVW-3653 USER’S GUIDE
WIRELESS
6.4
THE ACCESS CONTROL SCREEN
Use this screen to configure Media Access Control (MAC) address filtering on the
wireless network.
NOTE:
To configure MAC address filtering on the wired LAN, see The MAC Filtering
Screen on page 47.
You can set the BVW-3653 to allow only certain devices to access the BVW-3653
and the network wirelessly, or to deny certain devices access.
Click
Wireless
>
Access Control
. The following screen displays.
Pre-Shared Key
Enter the pre-shared key that you want to use for your
wireless network. You will need to enter this key into
your wireless clients in order to allow them to connect to
the network.
Pre-Authentication
Use this field to allow pre-authentication (
Enable
) in
WPA2, or deny pre-authentication requests (
Disable
).
In preauthentication, a WPA2 wireless client can
perform authentication with other wireless access points
in its range when it is still connected to its current
wireless access point. This allows mobile wireless
clients to connect to new access points more quickly,
permitting more efficient roaming.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 29:
The Wireless > Security Screen (continued)
Page 79 / 106
79
HITRON BVW-3653 USER’S GUIDE
WIRELESS
FIGURE 31:
The Wireless > Access Control
The following table describes the labels in this screen.
TABLE 30:
The Wireless > Access Control Screen
MAC Filtering
SSID
Select the SSID for which you want to configure wireless
access control.
NOTE:
At the time of writing, the BVW-3653 supports a
single SSID.
MAC Filtering Mode
Use this field to control whether the BVW-3653 performs
MAC filtering on the wireless network.
±
Select
Allow-All
to turn MAC filtering off. All devices
may access the BVW-3653 and the network
wirelessly.
±
Select
Allow
to permit only devices with the MAC
addresses you set up in the
Wireless Control List
to
access the BVW-3653 and the network wirelessly. All
other devices are denied access.
±
Select
Deny
to permit all devices except those with
the MAC addresses you set up in the
Wireless
Control List
to access the BVW-3653 and the
network wirelessly. The specified devices are denied
access.
Apply
Click this to save your changes in the MAC filtering
section.
Wireless Control List (up to 16 Items)
Page 80 / 106
80
HITRON BVW-3653 USER’S GUIDE
WIRELESS
6.5
THE ADVANCED SCREEN
Click
Wireless
>
Advanced
. The following screen displays.
# Index
This displays the index number assigned to the
permitted or denied wireless device.
Device Name
This displays the name you gave to the permitted or
denied wireless device.
MAC Address
This displays the MAC address of the permitted or
denied wireless device.
Delete
Select a permitted or denied wireless device’s radio
button (
) and click this to remove the device from the
list. The device may no longer access the BVW-3653
and the network.
Auto-Learned Wireless Devices
Device Name
This displays the name of each network device that has
connected to the BVW-3653 on the wireless network.
MAC Address
This displays the MAC address of each network device
that has connected to the BVW-3653 on the wireless
network.
Manually-Added Wireless Devices
Device Name
Enter the name to associate with a network device that
you want to permit or deny access to the BVW-3653 and
the network wirelessly.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
MAC Address
Specify the MAC address of the network device that you
want to permit or deny access to the BVW-3653 and the
network wirelessly.
Add
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 30:
The Wireless > Access Control Screen (continued)

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top