Page 26 / 43 Scroll up to view Page 21 - 25
C. User Guide
20
Figure 4-17: Wireless Network Encryption
6.
Select encryption for wireless network data transfer. Select one of the following:
-
Off - no encryption on the wireless network
-
64-bit encryption on the wireless network
. A basic encryption method. You must provide a
10-character hex key.
-
128-bit encryption on the wireless network
. Advanced encryption method. You must
provide a 26-character hex key.
-
Wi-Fi Protected Access (WPA) on the wireless network
. A reliable security method. You
must provide a password of 8 to 63 characters long.
-
Wi-Fi Protected Access2 (WPA2) on the wireless network
Depending on the encryption method you have selected, follow one of the following instructions: “
64/128-
bit encryption
” or “
Wi-Fi Protected Access WPA/WPA2
”.
4.5.2.1
64/128-bit encryption
For both encryption methods, you need to configure a key. Your wireless network can be accessed only by
providing this key.
1.
Select
64-bit encryption on the wireless network
(or
128-bit encryption on the wireless network
).
Figure 4-18: 64/a28-bit encryption
2.
Click
Next
. The following page opens.
Page 27 / 43
4.5.2.1 64/128-bit encryption
21
Figure 4-19: Key or password selection
3.
Select on of the two options:
Key
Enter a key of your choice. For a 64-bit encryption, the key must consist of 10 characters long,
(letters A to F or digits 0 to 9). For a 128-bit encryption, the key must be 26 characters long (letters
A to F or digits 0 to 9).
Pasphrase
Select this option if you want the device to generate a key based on the passphrase that you
provide.
4.
After you have provided the key, the following page opens.
Figure 4-20: Address Authentication
5.
In this page select one of the following options:
Allow any wireless PCs to connect
- with this option you allow any PC to connect to your
wireless network.
Allow all wireless PCs to connect except those I specify
- with this option you specify those
PCs that will be denied access to your wireless network.
Only allow the wireless PCs I specify to connect
- with this option, you specify a list of PCs that
are allowed to connect to your wireless network.
6.
If you have selected to specify a deny or allow list of PCs in the previous step, you will be prompted to
add addresses of PCs to the list.
7.
Before you confirm changes that you have made, the following page is displayed.
Page 28 / 43
C. User Guide
22
Figure 4-21: Wireless Network - Confirm settings
4.5.2.2
Wi-Fi Protected Access WPA/WPA2
For both encryption methods, you need to set a passphrase. Your wireless network can be accessed only
by providing this passphrase.
1.
Select
Wi-Fi Protected Access (WPA) on the wireless network
(or
Wi-Fi Protected Access2
(WPA2) on the wireless network
). The following page opens.
Figure 4-22: Wi-Fi Methods
2.
Select the Authentication method and the Encryption protocol method.
3.
Click
Next
. The following page opens.
Page 29 / 43
4.5.2.2 Wi-Fi Protected Access WPA/WPA2
23
Figure 4-23: Wi-Fi Protected Access
4.
Provide a passphrase to access your wireless network. The passphrase must consist of at least 8 and
not more than 63 characters.
Figure 4-24: Address Authentication
5.
After you have provided the passphrase, the following page opens.
Figure 4-25: Address Authentication
6.
In this page select one of the following options:
Allow any wireless PCs to connect
- with this option you allow any PC to connect to your
wireless network.
Allow all wireless PCs to connect except those I specify
- with this option you specify those
PCs that will be denied access to your wireless network.
Only allow the wireless PCs I specify to connect
- with this option, you specify a list of PCs that
Page 30 / 43
C. User Guide
24
are allowed to connect to your wireless network.
7.
If you have selected on of the last two options in the previous step, you will be prompted to add the
MAC addresses of PCs to the list.
8.
Before you confirm changes that you have made, the following page is displayed.
Figure 4-26: Wireless Network - Confirm settings
4.6
Voice Configuration
The
Voice Configuration
page enables you to monitor the status of voice connections on your home
gateway device.
Click the
Voice
option. The following page is displayed.
Figure 4-27: Voice Settings page
You can have two phones connected to your device. The status of each is indicated either by Phone 1
(connected to port TEL1) or Phone 2 (connected to port TEL2).
±
Status
: displays the status of your phones (registered, unknown,...).
±
Number
: displays the directory number of your phone.
4.7
Security
Sinope568+ contains advanced security features that prevent other computers on the Internet from
connecting to your PCs. You should only change the default security settings if you have experience in
network configuration. In most cases you will not need to make any changes.

Rate

3.5 / 5 based on 2 votes.

Popular Iskratel Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top