Page 26 / 69 Scroll up to view Page 21 - 25
20
Chapter 6: Configuring the Wireless-N Access Point
The Wireless - Wireless Security Tab
Wireless-N Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Change the Access Point’s wireless security settings on this screen.
Wireless Security
Security Mode
. Select the wireless security mode you want to use,
WPA-Personal
,
WPA2-Personal
,
WPA2-
Personal Mixed
,
WPA-Enterprise
,
WPA2-Enterprise, WPA2-Enterprise Mixed
, or
WEP
. (WPA stands for Wi-Fi
Protected Access, which is a security standard stronger than WEP encryption and forward compatible with IEEE
802.11e. WEP stands for Wired Equivalent Privacy, Enterprise refers to using RADIUS server for authentication,
while RADIUS stands for Remote Authentication Dial-In User Service.) Refer to the appropriate instructions below
after you select the Authentication Type and SSID Interoperability settings. For detailed instructions on
configuring wireless security for the Access Point, refer to “Appendix B: Wireless Security.” To disable wireless
security completely, select
Disabled
. The default is
Disabled
.
Wireless Isolation (within SSID).
When disabled,
wireless PCs that are associated to the same network name
(SSID), can see and transfer files between each other. By enabling this feature, Wireless PCs will not be able to
see each other. This feature is very useful when setting up a wireless hotspot location. The default is
Disabled
.
Following section describes the detailed options for each Security Mode.
Disabled
There is no option to be configured for this mode.
WPA-Personal (aka WPA-PSK)
WPA Algorithms
. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of
algorithm you want to use,
TKIP
or
AES
. The default is
TKIP
.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-6: Wireless - Wireless Security (Disabled)
Figure 6-7: Wireless - Wireless Security (WPA-Personal)
Page 27 / 69
21
Chapter 6: Configuring the Wireless-N Access Point
The Wireless - Wireless Security Tab
Wireless-N Access Point with Power Over Ethernet
WPA2-Personal
WPA Algorithms
. WPA2 always uses AES for data encryption.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WPA2-Personal Mixed
This security mode supports the transition from WPA-Personal to WPA2-Personal. You can have client devices
that use either WPA-Personal or WPA2-Personal. The Access Point will automatically choose the encryption
algorithm used by each client device.
WPA Algorithms
. Mixed Mode automatically chooses TKIP or AES for data encryption.
WPA Shared Key
. Enter a WPA Shared Key of 8-63 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-8: Wireless - Wireless Security (WPA2-
Personal)
Figure 6-9: Wireless - Wireless Security (WPA2-Personal
Mixed)
Page 28 / 69
22
Chapter 6: Configuring the Wireless-N Access Point
The Wireless - Wireless Security Tab
Wireless-N Access Point with Power Over Ethernet
WPA-Enterprise
This option features WPA used in coordination with a RADIUS server for client authentication. (This should only be
used when a RADIUS server is connected to the Access Point.)
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithms
. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of
algorithm you want to use,
TKIP
or
AES
. The default is
TKIP
.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WPA2-Enterprise
This option features WPA2 used in coordination with a RADIUS server for client authentication. (This should only
be used when a RADIUS server is connected to the Access Point.)
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithms
. WPA2 always uses AES for data encryption.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
Figure 6-10: Wireless - Wireless Security (WPA-
Enterprise)
Figure 6-11: Wireless - Wireless Security (WPA2-
Enterprise)
Page 29 / 69
23
Chapter 6: Configuring the Wireless-N Access Point
The Wireless - Wireless Security Tab
Wireless-N Access Point with Power Over Ethernet
WPA2-Enterprise Mixed
This security mode supports the transition from WPA-Enterprise to WPA2-Enterprise. You can have client devices
that use either WPA-Enterprise or WPA2-Enterprise. The Access Point will automatically choose the encryption
algorithm used by each client device.
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server. The default is 1812.
WPA Algorithms
. Mixed Mode automatically chooses TKIP or AES for data encryption.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys. The default is
3600
seconds.
WEP
This security mode is defined in the original IEEE 802.11. This mode is not recommended now due to its weak
security protection. Users are urged to migrate to WPA or WPA2.
Authentication Type.
Choose the 802.11 authentication type as either
Open System
or
Shared Key
. The default
is
Open System
.
Default Transmit Key
. Select the key to be used for data encryption.
WEP Encryption
. Select a level of WEP encryption,
64 bits (10 hex digits)
or
128 bits (26 hex digits)
.
Passphrase
. If you want to generate WEP keys using a Passphrase, then enter the Passphrase in the field
provided and click the
Generate
key. Those auto-generated keys are not as strong as manual WEP keys.
Key 1-4
. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of
the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit
encryption or 26 characters in length for 128-bit encryption.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen, and click
More
for additional details.
Figure 6-12: Wireless - Wireless Security (WPA2 -
Enterprise Mixed)
Figure 6-13: Wireless Settings - WEP
Page 30 / 69
24
Chapter 6: Configuring the Wireless-N Access Point
The Wireless - Wireless Connection Control Tab
Wireless-N Access Point with Power Over Ethernet
The Wireless - Wireless Connection Control Tab
This screen allows you to configure the Connection Control List to either permit or block specific wireless client
devices connecting to (associating with) the Access Point.
Wireless Connection Control
Enabled
/
Disabled
. Enable or disable wireless connection control. The default is
disabled
.
Connection Control
There are two ways to control the connection (association) of wireless client devices. You can either
prevent
specific devices from connecting to the Access Point, or you can
allow
only specific client devices to connect to
the Access Point. The client devices are specified by their MAC addresses. The default is to
allow
only specific
client devices.
Wireless Client List
Instead of manually entering the MAC addresses of each client, the Access Point provides a convenient way to
select a specific client device from the client association table. Click this button and a window appears to let you
select a MAC address from the table. The selected MAC address will be entered into the Connection Control List.
Connection Control List
MAC 01-20
. Enter the MAC addresses of the wireless client devices you want to control.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is displayed on the right-hand side of the screen.
Figure 6-14: Wireless - Wireless Connection Control
Figure 6-15: Select MAC Address from Wireless Client
List

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top