Page 21 / 67 Scroll up to view Page 16 - 20
15
Chapter 5: Configuring the Wireless-G Access Point with Power Over Ethernet
The Wireless - Basic Wireless Settings Tab
Wireless-G Access Point with Power Over Ethernet
Fallback feature. Auto-Fallback will automatically negotiate the best possible connection speed between the
Access Point and a wireless device.
Access Point VLAN ID
. Enter the VLAN ID of the Access Point. Make sure this matches at least one of the VLAN
IDs listed in the aforementioned table.
Wireless Channel
. Select the appropriate channel from the list provided; this will be the channel that all of your
wireless devices will use.
Wireless SSID Broadcast
. This feature allows the main SSID to be broadcast by the Access Point. You may want
to enable this function while configuring your network, but make sure that you disable it when you are finished.
With this enabled, someone could easily obtain the SSID information with site survey software and gain
unauthorized access to your main network. Click
Enabled
to broadcast the main SSID to all wireless devices in
range. Click
Disabled
to increase network security and block the main SSID from being seen on networked PCs.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Click
Help
for more information.
NOTE:
You must use the Access Point VLAN ID for one of your wireless networks in order to
maintain access to the Access Point’s Web-based Utility.
NOTE:
Only the main SSID of the Access Point can be broadcast. The Access Point cannot
broadcast any of its Virtual SSIDs.
Page 22 / 67
16
Chapter 5: Configuring the Wireless-G Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Change the Access Point’s wireless security settings on this screen.
Wireless Security
Enter the security settings for each SSID of the Access Point.
Select SSID
. Select the SSID whose security settings you want to configure.
Security Mode
. Select the security method you want to use,
WPA-Personal
,
WPA-Enterprise
,
RADIUS
, or
WEP
.
(WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WEP stands
for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.) Refer to the
appropriate instructions below. For detailed instructions on configuring wireless security for the Access Point,
turn to “Appendix B: Wireless Security.” To disable such security, select
Disable
.
WPA-Personal
Allow PCs with the same wireless network name (SSID) to see each other
. When enabled, devices in the
same wireless network will be able to access each other, so they can transfer files through the network. To deny
access, select
Disabled
. Otherwise, keep the default,
Enabled
.
WPA Algorithms
. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of algorithm you want to use,
TKIP
or
AES
.
WPA Shared Key
. Enter a WPA Shared Key of 8-32 characters.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Click
Help
for more information.
Figure 5-5: Wireless - Wireless Security
(WPA-Personal) Screen
encryption:
encoding data transmitted in a network.
Page 23 / 67
17
Chapter 5: Configuring the Wireless-G Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet
WPA-Enterprise
This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Access Point.)
Allow PCs with the same wireless network name (SSID) to see each other
. When enabled, devices in the
same wireless network will be able to access each other, so they can transfer files through the network. To deny
access, select
Disabled
. Otherwise, keep the default,
Enabled
.
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
WPA Algorithms
. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of algorithm you want to use,
TKIP
or
AES
.
RADIUS Server Port
. Enter the port number used by the RADIUS server.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Key Renewal Timeout
. Enter a Key Renewal Timeout period, which instructs the Access Point how often it
should change the encryption keys.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Click
Help
for more information.
Figure 5-6: Wireless Security - WPA-Enterprise Screen
radius:
a protocol that uses an authentication server to
control network access.
server:
any computer whose function in a network is to
provide user access to files, printing, communications, and
other services.
Page 24 / 67
18
Chapter 5: Configuring the Wireless-G Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet
RADIUS
This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Access Point.)
Allow PCs with the same wireless network name (SSID) to see each other
. When enabled, devices in the
same wireless network will be able to access each other, so they can transfer files through the network. To deny
access, select
Disabled
. Otherwise, keep the default,
Enabled
.
RADIUS Server IP Address
. Enter the RADIUS server’s IP address.
RADIUS Server Port
. Enter the port number used by the RADIUS server.
Shared Secret
. Enter the Shared Secret key used by the Access Point and RADIUS server.
Default Transmit Key
. Select a Default Transmit Key (choose which Key to use).
WEP Encryption
. Select a level of WEP encryption,
64 bits (10 hex digits)
or
128 bits (26 hex digits)
.
Passphrase
. To generate WEP keys using a Passphrase, then enter the Passphrase and click the
Generate
key.
Key 1-4
. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of
the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit
encryption or 26 characters in length for 128-bit encryption.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Click
Help
for more information.
Figure 5-7: Wireless Security - RADIUS Screen
Page 25 / 67
19
Chapter 5: Configuring the Wireless-G Access Point with Power Over Ethernet
The Wireless - Wireless Security Tab
Wireless-G Access Point with Power Over Ethernet
WEP
Authentication Type
. Select the authentication method you want the Access Point to use,
Shared Key
or
Open
System
. Shared Key is when both the sender and the recipient share a WEP key for authentication. Open System
is when the sender and the recipient do not share a WEP key for authentication. All devices on your network must
use the same authentication type.
Allow PCs with the same wireless network name (SSID) to see each other
. When enabled, devices in the
same wireless network will be able to access each other, so they can transfer files through the network. To deny
access, select
Disabled
. Otherwise, keep the default,
Enabled
.
Default Transmit Key
. Select a Default Transmit Key (choose which Key to use).
WEP Encryption
. Select a level of WEP encryption,
64 bits (10 hex digits)
or
128 bits (26 hex digits)
.
Passphrase
. To generate WEP keys using a Passphrase, then enter the Passphrase and click the
Generate
key.
Key 1-4
. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of
the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit
encryption or 26 characters in length for 128-bit encryption.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Click
Help
for more information.
Figure 5-8: Wireless Security - WEP Screen

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top