24
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Wireless Security
Wireless-G Media Storage Link Router with SpeedBooster
The Wireless Tab - Wireless Security
The Wireless Security settings configure the security of your wireless network. There are four wireless security
mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise,
RADIUS, and WEP. (WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a
security standard stronger than WEP encryption. WPA2 is stronger than WPA. WPA Enterprise is WPA used in
coordination with a RADIUS server. RADIUS stands for Remote Authentication Dial-In User Service.) These are
briefly discussed here. For detailed instructions on configuring wireless security for the Router, turn to “Appendix
B: Wireless Security.”
Wireless Security
WPA Personal
. WPA gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the
type of algorithm,
TKIP
or
AES
. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key Renewal
period, which instructs the Router how often it should change the encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
WPA Enterprise
. This option features WPA used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
TKIP
or
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and
the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change the
encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
Figure 5-21: Wireless Tab - Wireless Security (WPA
Personal)
Figure 5-22: Wireless Tab - Wireless Security (WPA
Enterprise)
IMPORTANT:
If you are using WPA, always remember
that each device in your wireless network MUST use
the same WPA method and shared key, or else the
network will not function properly.
wpa
(wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
encryption:
encoding data transmitted in a network.
Downloaded from
www.Manualslib.com
manuals search engine