Page 36 / 70 Scroll up to view Page 31 - 35
150M Wireless-N Broadband Router
(iB-WRB150N)
35
b. Or you can use the Open Scan option.
1)
Click the “Open Scan” button to display a list of available wireless
networks.
Page 37 / 70
150M Wireless-N Broadband Router
(iB-WRB150N)
36
2) Select the iB-WRH150N-2
’s SSID from the list and click OK on the
appearing dialogue box; iB-WRH150N-2
’s MAC address, S
SID and
channel settings will be automatically added to the iBl-WRH150N-1
3) Click OK to save your settings.
4) Configure wireless security settings. For this step, refer to section 5.2
hereof.
5) Repeat steps 1-4 on iB-WRH150N-2. After the 2 routers have added
each other’s MAC address and share the same SSID, channel, security
settings and security key, the WDS feature can be implemented.
Note:
1. WDS feature can be implemented only between 2 wireless devices that both
support the WDS feature. Plus, SSID, channel, security settings and security key
must be the same on both devices. Using the Open Scan option and selecting link
partner from the scan list automatically change the router’s existing SSID and
channel settings respectively to those of lin
k partner as well as add link partner’s
MAC address. So we recommend you to use this Open Scan option for easy WDS
settings.
2. Using WEP encryption improves WDS compatibility. For this reason, we
recommend you to encrypt your wireless network with WEP when using the WDS
feature.
Page 38 / 70
150M Wireless-N Broadband Router
(iB-WRB150N)
37
5.2 Wireless Security
This section allows you to configure wireless security settings to block
unauthorized access to your wireless network and prevent malicious
packet sniffing. You have 4 ways to encrypt your wireless data: WPS,
WEP, WPA-PSK and WPA2-PSK.
5.2.1 WPS Settings
Wi-Fi Protected Setup makes it easy for home users who know little of
wireless security to establish a secure wireless home network, as well as
to add new devices to an existing network without entering long
passphrases or configuring complicated settings. Simply enter a PIN code
or press the software PBC button or hardware WPS button (if any) and a
secure wireless connection is established.
WPS Settings
: Select to enable/disable the WPS encryption. It is
enabled by default.
WPS Mode
: Select PBC (Push-Button Configuration) or PIN.
PBC
: Click this software button or directly press the hardware WPS
button on both your router and the new wireless client device (that you
want to connect to your router wirelessly) for 1 second to establish an easy
and secure wireless connection.
PIN
: To use this option you must know the PIN code from the wireless
client. Simply click the PIN radio button an
d enter client’s PIN code while
using the same PIN code on client side for secure connection.
Reset OOB
: When clicked, the WPS LED will display a solid light; the
WPS function will be disabled automatically; WPS server on the Router
enters idle mode a
nd will not respond to client’s WPS connection request.
Page 39 / 70
150M Wireless-N Broadband Router
(iB-WRB150N)
38
Note
:
1. If you find the WPS LED blinking for 2 minutes after you select and apply
the PBC mode, it means that the PBC encryption method is successfully enabled.
And an authentication will be performed between your router and the
WPS/PBC-enabled wireless client device during this time; if it succeeds, the
wireless client device connects to your device, and the WPS LED displays a solid
light thereafter. Repeat steps mentioned above if you want to connect more wireless
client devices to your router.
2. The WPS function can be implemented only between your Router and
another WPS-enabled device.
5.2.2 WPA-PSK
The WPA protocol implements the majority of the IEEE 802.11i
standard. It enhances data encryption through the Temporal Key Integrity
Protocol (TKIP) which is a 128-bit per-packet key, meaning that it
dynamically generates a new key for each packet. WPA also includes a
message integrity check feature to prevent data packets from being
hampered with. Only authorized network users can access the wireless
network.
Security Mode
: Select a proper mode, which is also supported by your
wireless clients, from the drop-down menu.
WPA Algorithms
: Select either AES (advanced encryption standard) or
TKIP (temporary key integrity protocol) type.
Key
: Enter a security key
which must be between 8-63 ASCII
characters.
Key Renewal Interval
: Enter a valid time period for the key.
Page 40 / 70
150M Wireless-N Broadband Router
(iB-WRB150N)
39
5.2.3 WPA2-PSK
The later WPA2 protocol features compliance with the full IEEE
802.11i standard and uses Advanced Encryption Standard (AES) in
addition to TKIP encryption protocol to guarantee better security than that
provided by WEP or WPA.
5.2.4 WEP
WEP is intended to provide data confidentiality comparable to that of
a traditional wired network. Two methods of authentication can be used
with WEP: Open System authentication and Shared Key authentication.
WEP Key
: You can select either ASCII or Hexadecimal from the
drop-down menu.
Note
: If you select ASCII, enter 5 or 13 valid ASCII characters; or if you
select Hexadecimal, enter 10 or 26 Hexadecimal characters.
Default Key
: Select one key from the 4 preset keys.
5.3 MAC Filtering
The MAC filtering feature can be used to allow or disallow clients to
connect to your wireless network.

Rate

4.5 / 5 based on 2 votes.

Popular iBall Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top