Page 81 / 113 Scroll up to view Page 76 - 80
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
81
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
81
HITRON CGN2 USER’S GUIDE
Recipient List (up to 4
items)
Use this section to define up to four target email address
to which admin emails will be sent.
To enter a new target email address, click
Add
.
Enter the target email address’s
Name
and
Recipient’s Address
in the fields that display, then
click
Apply
to save your changes. Alternatively, click
Cancel
to return to the previous screen without
saving your changes.
Figure 27:
Add Target Email Address
To make changes to an existing target email
address, select its radio button and click
Edit
. The
screen that displays is the same as the
Add Target
Email Address
screen.
To remove an email address, select its radio button
and click
Delete
. The email address is removed from
the list.
Syslog Server
Configuration
Use this section to define the server on which the
system log is stored.
Syslog Server
Address
Enter the address of the server on which the system log
is stored.
Alert Options
Use this section to define the actions to be taken when
an intrusion event is detected.
When Intrusion is
Detected
Select
Send Email
to send an email to the list when
an intrusion event is detected.
Select
Send Syslog
to send an entry to the system
log when an intrusion event is detected.
Apply
Click this to save your changes to the fields in this
screen.
Table 26:
The Parental Control > Email / Syslog Alert Screen (continued)
Page 82 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
82
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
82
HITRON CGN2 USER’S GUIDE
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Table 26:
The Parental Control > Email / Syslog Alert Screen (continued)
Page 83 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
83
HITRON CGN2 USER’S GUIDE
6
WIRELESS
This chapter describes the screens that display when you click
Wireless
in the
toolbar. It contains the following sections:
Wireless Overview
on page
83
The Setup Screen
on page
86
The Access Control Screen
on page
93
The Advanced Screen
on page
95
6.1
WIRELESS OVERVIEW
This section describes some of the concepts related to the
Wireless
screens.
6.1.1
WIRELESS NETWORKING BASICS
Your CGN2’s wireless network is part of the Local Area Network (LAN), known as the
Wireless LAN (WLAN). The WLAN is a network of radio links between the CGN2 and
the other computers and devices that connect to it.
6.1.2
ARCHITECTURE
The wireless network consists of two types of device: access points (APs) and
clients.
The access point controls the network, providing a wireless connection to each
client.
Page 84 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
84
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
84
HITRON CGN2 USER’S GUIDE
The wireless clients connect to the access point in order to receive a wireless
connection to the WAN and the wired LAN.
The CGN2 is the access point, and the computers you connect to the CGN2 are the
wireless clients.
6.1.3
WIRELESS STANDARDS
The way in which wireless devices communicate with one another is standardized by
the Institute of Electrical and Electronics Engineers (IEEE). The IEEE standards
pertaining to wireless LANs are identified by their 802.11 designation. There are a
variety of WLAN standards, but the CGN2 supports the following (in order of adoption
- old to new - and data transfer speeds - low to high):
IEEE 802.11b
IEEE 802.11g
IEEE 802.11n
6.1.4
SERVICE SETS AND SSIDS
Each wireless network, including all the devices that comprise it, is known as a
Service Set.
NOTE:
Depending on its capabilities and configuration, a single wireless access
point may control multiple Service Sets; this is often done to provide different
service or security levels to different clients.
Each Service Set is identified by a Service Set IDentifier (SSID). This is the name of
the network. Wireless clients must know the SSID in order to be able to connect to
the AP. You can configure the CGN2 to broadcast the SSID (in which case, any client
who scans the airwaves can discover the SSID), or to “hide” the SSID (in which case
it is not broadcast, and only users who already know the SSID can connect).
Page 85 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
85
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
85
HITRON CGN2 USER’S GUIDE
6.1.5
WIRELESS SECURITY
Radio is inherently an insecure medium, since it can be intercepted by anybody in the
coverage area with a radio receiver. Therefore, a variety of techniques exist to control
authentication (identifying who should be allowed to join the network) and encryption
(signal scrambling so that only authenticated users can decode the transmitted data).
The sophistication of each security method varies, as does its effectiveness. The
CGN2 supports the following wireless security protocols (in order of effectiveness):
WEP
(the Wired Equivalency Protocol): this protocol uses a series of “keys” or
data strings to authenticate the wireless client with the AP, and to encrypt data
sent over the wireless link. WEP is a deprecated protocol, and should only be
used when it is the only security standard supported by the wireless clients.
WEP provides only a nominal level of security, since widely-available software
exists that can break it in a matter of minutes.
WPA-PSK
(WiFi Protected Access - Pre-Shared Key): WPA was created to
solve the inadequacies of WEP. There are two types of WPA: the “enterprise”
version (known simply as WPA) requires the use of a central authentication
database server, whereas the “personal” version (supported by the CGN2)
allows users to authenticate using a “pre-shared key” or password instead.
While WPA provides good security, it is still vulnerable to “brute force”
password-guessing attempts (in which an attacker simply barrages the AP with
join requests using different passwords), so for optimal security it is advised that
you use a random password of thirteen characters or more, containing no
“dictionary” words.
WPA2-PSK
: WPA2 is an improvement on WPA. The primary difference is that
WPA uses the Temporal Key Integrity Protocol (TKIP) encryption standard
(which has been shown to have certain possible weaknesses), whereas WPA2
uses the stronger Advanced Encryption Standard (AES) in the Counter mode
with Cipher block chaining Message authentication code Protocol (CCMP),
which has received the US government’s seal of approval for communications
up to the Top Secret security level. Since WPA2-PSK uses the same pre-shared
key mechanism as WPA-PSK, the same caveat against using insecure or
simple passwords applies.
6.1.5.1
WPS
WiFi-Protected Setup (WPS) is a standardized method of allowing wireless devices
to quickly and easily join wireless networks, while maintaining a good level of
security. The CGN2 provides two methods of WPS authentication:

Rate

3.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top