Page 26 / 74 Scroll up to view Page 21 - 25
20
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
Default Transmit Key
. Select the key to be used for data encryption.
WEP Encryption
. Select a level of WEP encryption,
64 bits (10 hex digits)
or
128 bits (26 hex digits)
.
Passphrase
. If you want to generate WEP keys using a Passphrase, then enter the Passphrase in the field
provided and click the
Generate
key. Those auto-generated keys are not as strong as manual WEP keys.
Key 1-4
. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of
the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit
encryption or 26 characters in length for 128-bit encryption.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is available on the right side of the screen.
WPA-Personal (aka WPA-PSK)
WPA Algorithm
. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of
algorithm you want to use,
TKIP
or
AES
. The default is
TKIP
.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WPA2-Personal
WPA Algorithm
. WPA2 always uses AES for data encryption.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-6: Wireless - Wireless Security (WPA-Personal)
Figure 6-7: Wireless - Wireless Security (WPA2-Personal)
Page 27 / 74
21
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
WPA2-Personal Mixed
This security mode supports the transition from WPA-Personal to WPA2-Personal. You can have client devices
that use either WPA-Personal or WPA2-Personal. The Access Point will automatically choose the encryption
algorithm used by each client device.
WPA Algorithm
. Mixed Mode automatically chooses TKIP or AES for data encryption.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WPA-Enterprise
This option features WPA used in coordination with a RADIUS server for client authentication. (This should only
be used when a RADIUS server is connected to the Access Point.)
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithm
. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of
algorithm you want to use,
TKIP
or
AES
. The default is
TKIP
.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-8: Wireless - Wireless Security (WPA2-Personal
Mixed)
Figure 6-9: Wireless - Wireless Security (WPA-Enterprise)
Page 28 / 74
22
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
WPA2-Enterprise
This option features WPA2 used in coordination with a RADIUS server for client authentication. (This should only
be used when a RADIUS server is connected to the Access Point.)
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithm
. WPA2 always uses AES for data encryption.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WPA2-Enterprise Mixed
This security mode supports the transition from WPA-Enterprise to WPA2-Enterprise. You can have client devices
that use either WPA-Enterprise or WPA2-Enterprise. The Access Point will automatically choose the encryption
algorithm used by each client device.
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithm
. Mixed Mode automatically chooses TKIP or AES for data encryption.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-10: Wireless - Wireless Security (WPA2-
Enterprise)
Figure 6-11: Wireless - Wireless Security (WPA2 -
Enterprise Mixed)
Page 29 / 74
23
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
RADIUS
This security mode is also known as Dynamic WEP with IEEE 802.1X. A RADIUS server is used for client
authentication and WEP is used for data encryption. The WEP key is automatically generated by the RADIUS
server. Manual WEP key is no longer supported to ensure compatibility with Microsoft’s Windows
implementation.
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Disable
There is no option to be configured for this mode.
When you have finished making changes to the screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes. Help information is available on the right side of the
screen.
Figure 6-12: Wireless - Wireless Security (RADIUS)
Page 30 / 74
24
Chapter 6: Configuring the Wireless-G Access Point
The Wireless - Wireless Connection Control Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
The Wireless - Wireless Connection Control Tab
This screen allows you to configure the Connection Control List to either permit or block specific wireless client
devices connecting to (associating with) the Access Point.
Wireless Connection Control
Select SSID
. Select the SSID of the wireless network that you want to use wireless connection control on.
Enabled
/
Disabled
. Enable or disable wireless connection control. The default is
disabled
.
Connection Control
Allow only following MAC addresses to connect to wireless network
. When this option is selected, only
devices with a MAC address specified in the Connection Control List can connect to the Access Point.
Prevent following MAC addresses from connecting to wireless network
. When this option is selected,
devices with a MAC address specified in the Connection Control List will not be allowed to connect to the Access
Point.
Wireless Client List
Instead of manually entering the MAC addresses of each client, the Access Point provides a convenient way to
select a specific client device from the client association table. Click this button and a window appears to let you
select a MAC address from the table. The selected MAC address will be entered into the Connection Control List.
Connection Control List
MAC 01-16
. Enter the MAC addresses of the wireless client devices you want to control.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is available on the right side of the screen.
Figure 6-13: Wireless - Wireless Connection Control
Figure 6-14: Select MAC Address from Wireless Client List

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top