Page 81 / 98 Scroll up to view Page 76 - 80
81
HITRON CVE-30360 USER’S GUIDE
WIRELESS
WPA_Personal
NOTE:
These fields are only configurable when you select
WPA-Personal
from the
Security Mode
list.
WPA Mode
Select the type of WPA security that you want to use:
Select
WPA-PSK
to use Wifi Protected Access (Pre-
Shared Key) mode
Select
WPA2-PSK
to use Wifi Protected Access 2
(Pre-Shared Key) mode
Select
Auto (WPA-PSK or WPA2-PSK)
to allow
clients operating in either mode to connect to the
CVE-30360.
Cipher Type
Select the type of encryption that you want to use:
Select
TKIP
to use the Temporal Key Integrity
Protocol.
Select AES to use the Advanced Encryption
Standard.
Select TKIP and AES to allow clients using either
encryption type to connect to the CVE-30360.
Group Key Update
Interval
Enter the frequency (in seconds) with which you want
the CVE-30360 to create new pre-shared keys, and
issue them to the wireless client.
Pre-Shared Key
Enter the pre-shared key that you want to use for your
wireless network. You will need to enter this key into
your wireless clients in order to allow them to connect to
the network.
Pre-Authentication
Use this field to allow pre-authentication (
Enable
) in
WPA2, or deny pre-authentication requests (
Disable
).
In preauthentication, a WPA2 wireless client can
perform authentication with other wireless access points
in its range when it is still connected to its current
wireless access point. This allows mobile wireless
clients to connect to new access points more quickly,
permitting more efficient roaming.
Apply
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 26:
The Wireless > Security Screen (continued)
Page 82 / 98
82
HITRON CVE-30360 USER’S GUIDE
WIRELESS
6.4.3
THE ACCESS CONTROL SCREEN
Use this screen to configure Media Access Control (MAC) address filtering on the
wireless network.
NOTE:
To configure MAC address filtering on the wired LAN, see The MAC Filtering
Screen on page 50.
You can set the CVE-30360 to allow only certain devices to access the CVE-30360
and the network wirelessly, or to deny certain devices access.
Click
Wireless
>
Access Control
. The following screen displays.
FIGURE 29:
The Wireless > Access Control
The following table describes the labels in this screen.
TABLE 27:
The Wireless > Access Control Screen
MAC Filtering
SSID
Select the SSID for which you want to configure wireless
access control.
NOTE:
At the time of writing, the CVE-30360 supports a
single SSID.
Page 83 / 98
83
HITRON CVE-30360 USER’S GUIDE
WIRELESS
MAC Filtering Mode
Use this field to control whether the CVE-30360
performs MAC filtering on the wireless network.
Select
Allow-All
to turn MAC filtering off. All devices
may access the CVE-30360 and the network
wirelessly.
Select
Allow
to permit only devices with the MAC
addresses you set up in the
Wireless Control List
to
access the CVE-30360 and the network wirelessly.
All other devices are denied access.
Select
Deny
to permit all devices except those with
the MAC addresses you set up in the
Wireless
Control List
to access the CVE-30360 and the
network wirelessly. The specified devices are denied
access.
Apply
Click this to save your changes in the MAC filtering
section.
Wireless Control List (up to 16 Items)
# Index
This displays the index number assigned to the
permitted or denied wireless device.
Device Name
This displays the name you gave to the permitted or
denied wireless device.
MAC Address
This displays the MAC address of the permitted or
denied wireless device.
Delete
Select a permitted or denied wireless device’s radio
button (
) and click this to remove the device from the
list. The device may no longer access the CVE-30360
and the network.
Auto-Learned Wireless Devices
Device Name
This displays the name of each network device that has
connected to the CVE-30360 on the wireless network.
MAC Address
This displays the MAC address of each network device
that has connected to the CVE-30360 on the wireless
network.
Manually-Added Wireless Devices
Device Name
Enter the name to associate with a network device that
you want to permit or deny access to the CVE-30360
and the network wirelessly.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
MAC Address
Specify the MAC address of the network device that you
want to permit or deny access to the CVE-30360 and the
network wirelessly.
TABLE 27:
The Wireless > Access Control Screen (continued)
Page 84 / 98
84
HITRON CVE-30360 USER’S GUIDE
WIRELESS
6.4.4
THE WIFI SITE SURVEY SCREEN
Use this screen to view information about the wireless networks within the CVE-
30360’s coverage area.
Click
Wireless
>
WiFi Site Survey
. The following screen displays.
FIGURE 30:
The Wireless > WiFi Site Survey Screen
The following table describes the labels in this screen.
Add
Click this to save your changes to the fields in this
screen.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
TABLE 28:
The Wireless > WiFi Site Survey Screen
Survey Results
ch
This field displays the number of the radio channel that
the target wireless network is using.
SSID
This field displays the Service Set IDentifier of the target
wireless network.
BSSID
This field displays the Basic Service Set IDentifier of the
target wireless network. This is usually the Media
Access Control (MAC) address of the target network
device.
Security
This field displays the type of security that the target
wireless network is using.
Signal (%)
This field displays the signal strength of the target
wireless network, as received by the CVE-30360, as a
percentage fro 0 (no reception) to 100 (perfect
reception)
W-mode
This field displays the wireless network standard (for
instance, 11n) that the target wireless network is using.
TABLE 27:
The Wireless > Access Control Screen (continued)
Page 85 / 98
85
HITRON CVE-30360 USER’S GUIDE
WIRELESS
ExtCH
For IEEE 802.11n networks that support 40MHz
wireless transmissions, this field displays whether the
network uses channel bonding, and specifies whether
the extension channel is above or below the primary
control channel.
NOTE:
Channel bonding allows an access point to
increase data throughput by using two wireless
channels simultaneously, instead of a single
channel. When you use channel bonding, you
have a primary control channel, and an
extension channel. The extension channel may
be either directly above the control channel, or
directly below.
For IEEE 802.11n networks using channel bonding,
where the extension channel is above the main
channel,
ABOVE
displays.
For IEEE 802.11n networks using channel bonding,
where the extension channel is above the main
channel,
BELOW
displays.
For networks that do not use channel bonding,
NONE
displays.
Nt
This field displays whether the network is using
infrastructure mode, or ad-hoc mode.
NOTE:
In infrastructure mode, wireless devices connect
to a central Access Point (AP), which usually
connects to the Internet or another network via a
wired connection. In ad-hoc mode, wireless
devices connect to one another, as peers.
WPS DPID
This field displays whether the target network is using
WiFi Protected Setup (WPS) or not. If the target network
is using WPS, this field displays whether it is using PIN
mode, or Push-Button Configuration (PBC) mode.
If the target network is not using WPS,
NO
displays.
If the target network is using WPS, and allows
wireless devices to connect using the PIN mode,
PIN
displays.
If the target network is using WPS, and allows
wireless devices to connect using the push-button
mode,
PBC
displays.
NOTE:
See WPS on page 75 for more information on
WPS, and the difference between PIN and PBC
modes.
TABLE 28:
The Wireless > WiFi Site Survey Screen (continued)

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top