Page 46 / 155 Scroll up to view Page 41 - 45
LTE TDD B2268H
User Guide
5 Wireless
Issue 01 (2014-01-15)
Copyright © Huawei Technologies Co., Ltd.
39
Figure 5-9
Network Setting >Wireless>WPS
The following table describes the labels in this screen.
Table 5-8
Network Setting > Wireless > WPS
LABEL
DESCRIPTION
Enable WPS
Select
Enable
to activate WPS on the LTE Device.
Add a new device with WPS Method
Method 1 PBC
Use this section to set up a WPS wireless network using Push Button
Configuration (PBC).
WPS
Click this button to add another WPS-enabled wireless device (within
wireless range of the LTE Device) to your wireless network. This button
may either be a physical button on the outside of device, or a menu button
similar to the
WPS button
on this screen.
Note: You must press the other wireless device's WPS button within two
minutes of pressing this button.
Method 2 PIN
Use this section to set up a WPS wireless network by entering the PIN
(Personal Identification Number) of the client into the LTE Device.
Register
Enter the PIN of the device that you are setting up a WPS connection with
and click
Register
to authenticate and add the wireless device to your
wireless network.
You can find the PIN either on the outside of the device, or by checking
the device's settings.
Note: You must also activate WPS on that device within two minutes to
have it present its PIN to the LTE Device.
WPS Configuration Summary
AP PIN
The PIN of the LTE Device is shown here. Enter this PIN in the
configuration utility of the device you want to connect to using WPS.
Page 47 / 155
LTE TDD B2268H
User Guide
5 Wireless
Issue 01 (2014-01-15)
Copyright © Huawei Technologies Co., Ltd.
40
LABEL
DESCRIPTION
The PIN is not necessary when you use WPS push-button method.
Click the
Generate New PIN
button to have the LTE Device create a
new PIN.
Status
This displays
Configured
when the LTE Device has connected to a
wireless network using WPS or
Enable WPS
is selected and wireless or
wireless security settings have been changed. The current wireless and
wireless security settings also appear in the screen.
This displays
Not Configured
when there is no wireless or wireless
security changes on the LTE Device or you click
Release Configuration
to remove the configured wireless and wireless security settings.
Release
Configuration
This button is available when the WPS status is
Configured.
Click this button to remove all configured wireless and wireless security
settings for WPS connections on the LTE Device.
802.11 Mode
This is the 802.11 mode used. Only compliant WLAN devices can
associate with the LTE Device.
SSID
This is the name of the wireless network.
Security
This is the type of wireless security employed by the network.
Apply
Click
Apply
to save your changes.
5.5 The WMM Screen
Use this screen to enable or disable WiFi MultiMedia (WMM) wireless networks for
multimedia applications.
Click
Network Setting > Wireless > WMM
. The following screen displays.
Figure 5-10
Network Setting>Wireless>WMM
The following table describesthelabelsinthisscreen.
Table 5-9
Network Setting > Wireless > WMM
LABEL
DESCRIPTION
Enable WMM
of SSID1~4
This enables the LTE Device to automatically give a service a priority
level according to the ToS value in the IP header of packets it sends.
Page 48 / 155
LTE TDD B2268H
User Guide
5 Wireless
Issue 01 (2014-01-15)
Copyright © Huawei Technologies Co., Ltd.
41
LABEL
DESCRIPTION
WMM QoS (WiFi MultiMedia Quality of Service) gives high priority to
voice and video, which makes them run more smoothly.
Enable WMM
Automatic
Power Save
Deliver (APSD)
Click this to increase battery life for battery-powered wireless clients.
APSD uses a longer beacon interval when transmitting traffic that does
not require a short packet exchange interval.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
5.6 Scheduling Screen
Click
Network Setting > Wireless > Scheduling
to open the
Wireless LAN Scheduling
screen. Use this screen to configure when the LTE Device enables or disables the wireless LAN.
Figure 5-11
Network Setting > Wireless >Scheduling
The following table describes the labels in thisscreen.
Table 5-10
Network Setting > Wireless > Scheduling
LABEL
DESCRIPTION
Wireless LAN
Scheduling
Select
Enable
to activate wireless LAN scheduling on your LTE Device.
WLAN status
Select
On
or
Off
to enable or disable the wireless LAN.
Day
Select the day(s) you want to turn the wireless LAN on or off.
Between the
following times
Specify the time period during which to apply the schedule.
For example, you want the wireless network to be only available during
work hours. Check Mon ~ Fri in the day column, and specify 8:00 ~
18:00 in the time table.
Page 49 / 155
LTE TDD B2268H
User Guide
5 Wireless
Issue 01 (2014-01-15)
Copyright © Huawei Technologies Co., Ltd.
42
LABEL
DESCRIPTION
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
5.7 Technical Reference
This section discusses wireless LANs in depth.
5.7.1 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the
data passing over the airwaves, but also join the network. Once an unauthorized person has
access to the network, he or she can steal information or introduce malware (malicious software)
intended to compromise the network. For these reasons, a variety of security systems have been
developed to ensure that only authorized people can use a wireless data network, or understand
the data carried on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a "key" phrase) can access
the network. Second, they encrypt. This means that the information sent over the air is encoded.
Only people with the code key can understand the information, and only people who have been
authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not
keep a determined attacker out. Other security standards are secure in themselves but can be
broken if a user does not use them properly. For example, the WPA-PSK security standard is
very secure if you use a long key which is difficult for an attacker's software to guess - for
example, a twenty-letter long string of apparently random numbers and letters - but it is not very
secure if you use a short key which is very easy to guess - for example, a three-letter word from
the dictionary.
Because of the damage that can be done by a malicious attacker, it's not just people who have
sensitive information on their network who should use security. Everybody who uses any
wireless network should ensure that effective security is in place.
A good way to come up with effective security keys, passwords and so on is to use obscure
information that you personally will easily remember, and to enter it in a way that appears
random and does not include real words. For example, if your mother owns a 1970 Dodge
Challenger and her favorite movie is Vanishing Point (which you know was made in 1971) you
could use "70dodchal71vanpoi" as your security key.
The following sections introduce different types of wireless security you can set up in the
wireless network.
Page 50 / 155
LTE TDD B2268H
User Guide
5 Wireless
Issue 01 (2014-01-15)
Copyright © Huawei Technologies Co., Ltd.
43
5.7.2.1 SSID
Normally, the LTE Device acts like a beacon and regularly broadcasts the SSID in the area. You
can hide the SSID instead, in which case the LTE Device does not broadcast the SSID. In
addition, you should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information
that is sent in the wireless network.
5.7.2.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number, called a MAC
address.1 A MAC address is usually written using twelve hexadecimal characters2; for example,
00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each device in the wireless
network, see the device's User's Guide or other documentation.
You can use the MAC address filter to tell the LTE Device which devices are allowed or not
allowed to use the wireless network. If a device is allowed to use the wireless network, it still
has to have the correct information (SSID, channel, and security). If a device is not allowed to
use the wireless network, it does not matter if it has the correct information.
This type of security does not protect the information that is sent in the wireless network.
Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an
authorized device. Then, they can use that MAC address to use the wireless network.
1.
Some wireless devices, such as scanners, can detect wireless networks but cannot use
wireless networks. These kinds of wireless devices might not have MAC addresses.
2.
Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
5.7.2.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the
wireless network. You can make every user log in to the wireless network before using it.
However, every device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS
server, you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
5.7.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend on the type of authentication. (See Section
5.7.2 for information about this.)

Rate

4 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top