Page 91 / 113 Scroll up to view Page 86 - 90
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
91
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
91
HITRON CGN2 USER’S GUIDE
WEP Key Length
Use this field to specify the length of the security key
used to allow wireless devices to join the network. The
longer the key, the more secure it is.
Select
64-bit
to use a ten-digit security key.
Select
128-bit
to use a twenty-six-digit security key.
WEP Key 1~4
Use these fields to define the security keys that all
wireless devices on the network must use to join the
network.
The CGN2 supports up to four WEP keys, of which you
can select one as the default. You should input the
same four keys, in the same order, in your network’s
wireless clients. Your CGN2 and your wireless clients
can use different default keys, as long as all four keys
are present and in the same order. If your wireless client
supports only a single WEP key, use the CGN2’s default
key.
Enter the keys in hexadecimal format (using the digits
0
~
9
and the letters
A
~
F
).
Default WEP Key
Select the number of the security key that you want the
CGN2 to use as its default authentication key for
transmissions.
Authentication
Select the authentication mode that you want to use:
Select
Open System
to allow wireless clients to
authenticate (identify themselves) to the CGN2
before presenting their security credentials (WEP
keys).
Select
Shared Key
to use the WEP key in the
authentication process. When a client wants to
associate, the CGN2 sends an unencrypted
challenge message. The client must use the WEP
key to encrypt the challenge message and return it to
the CGN2, which then decrypts the message and
compares the result with its original message.
Open System
authentication is the more secure of the
two authentication types, since while the
Shared Key
system appears more robust, it is possible to derive
secure data by capturing the challenge messages.
Select
Automatic
to have the CGN2 choose the
authentication method.
Table 27:
The Wireless > Setup Screen (continued)
Page 92 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
92
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
92
HITRON CGN2 USER’S GUIDE
WPA_Personal
NOTE:
These fields display only when you select
WPA-Personal
from the
Security
Mode
list.
WPA Mode
Select the type of WPA security that you want to use:
Select
WPA-PSK
to use Wifi Protected Access (Pre-
Shared Key) mode
Select
WPA2-PSK
to use Wifi Protected Access 2
(Pre-Shared Key) mode
Select
Auto (WPA-PSK or WPA2-PSK)
to allow
clients operating in either mode to connect to the
CGN2.
Cipher Type
Select the type of encryption that you want to use:
Select
TKIP
to use the Temporal Key Integrity
Protocol.
Select
AES
to use the Advanced Encryption
Standard.
Select
TKIP and AES
to allow clients using either
encryption type to connect to the CGN2.
Group Key Update
Interval
Enter the frequency (in seconds) with which you want
the CGN2 to create new pre-shared keys, and issue
them to the wireless client.
Pre-Shared Key
Enter the pre-shared key that you want to use for your
wireless network. You will need to enter this key into
your wireless clients in order to allow them to connect to
the network.
Pre-Authentication
Use this field to allow pre-authentication (
Enable
) in
WPA2, or deny pre-authentication requests (
Disable
).
In preauthentication, a WPA2 wireless client can
perform authentication with other wireless access points
in its range when it is still connected to its current
wireless access point. This allows mobile wireless
clients to connect to new access points more quickly,
permitting more efficient roaming.
Apply
Click this to save your changes to the fields in this
screen.
Table 27:
The Wireless > Setup Screen (continued)
Page 93 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
93
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
93
HITRON CGN2 USER’S GUIDE
6.3
THE ACCESS CONTROL SCREEN
Use this screen to configure Media Access Control (MAC) address filtering on the
wireless network.
NOTE:
To configure MAC address filtering on the wired LAN, see The Filter Setting
Screen on page 57.
You can set the CGN2 to allow only certain devices to access the CGN2 and the
network wirelessly, or to deny certain devices access.
Click
Wireless
>
Access Control
. The following screen displays.
Figure 30:
The Wireless > Access Control Screen
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Table 27:
The Wireless > Setup Screen (continued)
Page 94 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
94
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
94
HITRON CGN2 USER’S GUIDE
The following table describes the labels in this screen.
Table 28:
The Wireless > Access Control Screen
MAC Filtering
SSID
Select the SSID for which you want to configure wireless
access control.
NOTE:
At the time of writing, the CGN2 supports a
single SSID.
MAC Filtering Mode
Use this field to control whether the CGN2 performs
MAC filtering on the wireless network.
Select
Allow-All
to turn MAC filtering off. All devices
may access the CGN2 and the network wirelessly.
Select
Allow
to permit only devices with the MAC
addresses you set up in the
Wireless Control List
to
access the CGN2 and the network wirelessly. All
other devices are denied access.
Select
Deny
to permit all devices except those with
the MAC addresses you set up in the
Wireless
Control List
to access the CGN2 and the network
wirelessly. The specified devices are denied access.
Apply
Click this to save your changes in the MAC filtering
section.
Wireless Control List (up to 16 Items)
# Index
This displays the index number assigned to the
permitted or denied wireless device.
Device Name
This displays the name you gave to the permitted or
denied wireless device.
MAC Address
This displays the MAC address of the permitted or
denied wireless device.
Delete
Select a permitted or denied wireless device’s radio
button (
) and click this to remove the device from the
list. The device may no longer access the CGN2 and the
network.
Wireless Devices
Auto-Learned Wireless Devices
Device Name
This displays the name of each network device that has
connected to the CGN2 on the wireless network.
Page 95 / 113
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
95
Version 2.0, February 2012. Copyright
2012 Hitron Technologies
95
HITRON CGN2 USER’S GUIDE
6.4
THE ADVANCED SCREEN
Click
Wireless
>
Advanced
. The following screen displays.
MAC Address
This displays the MAC address of each network device
that has connected to the CGN2 on the wireless
network.
Add
Select a device’s checkbox and click
Add
to add the
device to the
Wireless Control List
.
Manually-Added Wireless Devices
Device Name
Enter the name to associate with a network device that
you want to permit or deny access to the CGN2 and the
network wirelessly.
NOTE:
This name is arbitrary, and does not affect
functionality in any way.
MAC Address
Specify the MAC address of the network device that you
want to permit or deny access to the CGN2 and the
network wirelessly.
Add
Click this to add any
Manually-Added Wireless
Devices
, and
Auto-Learned Wireless Devices
with
their Add boxes checked, to the
Wireless Control List
.
Cancel
Click this to return the fields in this screen to their last-
saved values without saving your changes.
Help
Click this to see information about the fields in this
screen.
Table 28:
The Wireless > Access Control Screen (continued)

Rate

3.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top