Page 36 / 116 Scroll up to view Page 31 - 35
Wireless-G Broadband Router with 2 Phone Ports
28
Chapter 5: Configuring the Router
The Wireless Tab - Wireless Security
WPA-RADIUS
. This option features WPA used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) Select
TKIP
or
AES
from the
WPA Algorithm
drop-down
menu. Enter the RADIUS server’s IP address and port number, along with the Shared Key, which is the key
shared between the Router and the server. Last, enter the Key Renewal Timeout period, which instructs the
Router how often it should change the encryption keys.
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
RADIUS
. This option features WEP encryption used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) Enter the RADIUS server’s IP address and port number,
along with the Shared Key, which is the key shared between the Router and the server.
To indicate which WEP key to use, select the appropriate
Default Transmit Key
number. Select a level of WEP
encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. If you want to use a Passphrase, then enter it in
the
Passphrase
field and click the
Generate
button. If you want to enter the WEP key(s) manually, then enter it
in the
Key 1-4
field(s).
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-14: Wireless Tab -
Wireless
Security (RADIUS)
Figure 5-13: Wireless Tab -
Wireless
Security (WPA-RADIUS)
radius
: a protocol that uses an
authentication server to control
network access.
Page 37 / 116
Wireless-G Broadband Router with 2 Phone Ports
29
Chapter 5: Configuring the Router
The Wireless Tab - Wireless Security
WEP
. WEP is a basic encryption method, which is not as secure as WPA.
To indicate which WEP key to use,
select the appropriate
Default Transmit Key
number. Select a level of WEP encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. If you want to use a Passphrase, then enter it in the
Passphrase
field and click the
Generate
button. If you want to enter the WEP key(s) manually, then enter it in the
Key 1-4
field(s).
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
Figure 5-15: Wireless Tab -
Wireless
Security (WEP)
Page 38 / 116
Wireless-G Broadband Router with 2 Phone Ports
30
Chapter 5: Configuring the Router
The Wireless Tab - Wireless MAC Filter
The Wireless Tab - Wireless MAC Filter
Wireless MAC Filter
Wireless MAC Filter
. If you want to filter wireless access by MAC address, select
Enable
. Otherwise, select
Disable
.
Click
Prevent
to block access for the designated computers, or click
Permit only
to permit access for the
designated computers. Click the
Update Filter List
button, and the
Mac Address Filter List
screen will appear.
Enter the MAC addresses of the computers you want to designate. To see a list of MAC addresses for wireless
computers or clients, click the
Wireless Client MAC List
button.
The
Wireless Client MAC List
screen will list Client Host Names, IP Addresses, and MAC Addresses for your
wireless devices. Click the
Refresh
button to get the most up-to-date information. To add a specific computer to
the Mac Address Filter List, click the
Enable MAC Filter
checkbox and then the
Update Filter List
button. Click
the
Close
button to return to the
MAC Address Filter List
screen.
On the
MAC Address Filter List
screen, click the
Save Settings
button to save this list, or click the
Cancel
Changes
button to remove your entries.
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Figure 5-16: Wireless Tab -
Wireless
MAC Filter
Figure 5-18: Wireless Client MAC List
Figure 5-17: MAC Address Filter List
Page 39 / 116
Wireless-G Broadband Router with 2 Phone Ports
31
Chapter 5: Configuring the Router
The Wireless Tab - Advanced Wireless Settings
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by
an expert administrator as incorrect settings can reduce wireless performance.
Advanced Wireless Settings
Preamble Type
. The preamble defines the length of the CRC block for communication between the Router and
the roaming wireless adapters. (High network traffic areas should use the shorter preamble type.) Select the
appropriate preamble type for your network. If you are not sure which setting to select, then keep the default
setting,
Long Preamble
.
Authentication Type
. The default is set to
Auto
, which allows Open System and Shared Key authentication. For
Open System authentication, the sender and the recipient do not use a WEP key for authentication but can use
WEP for data encryption. For Shared Key authentication, the sender and recipient use a WEP key for both
authentication and data encryption. To only allow Open System authentication, select
Open
. To only allow
Shared Key authentication, select
Shared Key
. In most cases, you should keep the default setting,
Auto
,
because some clients cannot be configured for Shared Key.
CTS Protection Mode
. CTS (Clear-To-Send) Protection Mode function boosts the Router’s ability to catch all
Wireless-G transmissions but will severely decrease performance. Keep the default setting,
Auto
, so the Router
can use this feature as needed, when the Wireless-G products are not able to transmit to the Router in an
environment with heavy 802.11b traffic.
CTS Protection Type
. CTS Protection Type specifies the type of traffic covered by the CTS Protection Mode.
Select
CTS-only
or
RTS-CTS
from the drop-down menu. If you are not sure which setting to select, then keep
the default setting,
CTS-only
.
Figure 5-19: Wireless Tab - Advanced
Wireless Settings
beacon interval
: data transmitted
on your wireless network that
keeps the network synchronized.
cts
(clear to send): a signal sent by
a wireless device, signifying that it
is ready to receive data.
Page 40 / 116
Wireless-G Broadband Router with 2 Phone Ports
32
Chapter 5: Configuring the Router
The Wireless Tab - Advanced Wireless Settings
Power Level
. You can adjust the output power of the Router to get the appropriate coverage for your wireless
network. Select the percentage of power you need for your environment. If you are not sure which setting to
select, then keep the default setting,
Full
.
Beacon Interval
. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet
broadcast by the Router to synchronize the wireless network. The default value is
100
.
DTIM Interval
. This indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a
countdown field informing clients of the next window for listening to broadcast and multicast messages. When
the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a
DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast and multicast messages.
The default value is
3
.
Fragmentation Length
. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Threshold. Setting the Fragmentation Length too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of
2346
.
RTS Threshold
. Should you encounter inconsistent data flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. In most cases, keep the default value,
2347
.
When you have finished making changes on this screen, click the
Save Settings
button to save the changes, or
click the
Cancel Changes
button to undo your changes.
rts
(request to send): a networking
method of coordinating large packets
through the RTS Threshold setting.
dtim
: a message included in data
packets that can increase wireless
efficiency.
fragmentation
: breaking a packet
into smaller units when
transmitting over a network
medium that cannot support the
original size of the packet.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top