Page 31 / 95 Scroll up to view Page 26 - 30
24
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Wireless Security
Wireless-G Media Storage Link Router with SpeedBooster
The Wireless Tab - Wireless Security
The Wireless Security settings configure the security of your wireless network. There are four wireless security
mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise,
RADIUS, and WEP. (WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a
security standard stronger than WEP encryption. WPA2 is stronger than WPA. WPA Enterprise is WPA used in
coordination with a RADIUS server. RADIUS stands for Remote Authentication Dial-In User Service.) These are
briefly discussed here. For detailed instructions on configuring wireless security for the Router, turn to “Appendix
B: Wireless Security.”
Wireless Security
WPA Personal
. WPA gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the
type of algorithm,
TKIP
or
AES
. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key Renewal
period, which instructs the Router how often it should change the encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
WPA Enterprise
. This option features WPA used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
TKIP
or
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and
the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change the
encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
Figure 5-21: Wireless Tab - Wireless Security (WPA
Personal)
Figure 5-22: Wireless Tab - Wireless Security (WPA
Enterprise)
IMPORTANT:
If you are using WPA, always remember
that each device in your wireless network MUST use
the same WPA method and shared key, or else the
network will not function properly.
wpa
(wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
encryption:
encoding data transmitted in a network.
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 95
25
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Wireless Security
Wireless-G Media Storage Link Router with SpeedBooster
WPA2 Personal
. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of algorithm,
AES
, or
TKIP +
AES
. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key
Renewal period, which instructs the Router how often it should change the encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
WPA2 Enterprise
. This option features WPA2 used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
AES
, or
TKIP +
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between the
Router and the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change
the encryption keys.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
Figure 5-23: Wireless Tab - Wireless Security (WPA2
Personal)
Figure 5-24: Wireless Tab - Wireless Security (WPA2
Enterprise)
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 95
26
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Wireless Security
Wireless-G Media Storage Link Router with SpeedBooster
RADIUS
. This option features WEP used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along
with a key shared between the Router and the server. Then, select a Default Transmit Key (choose which Key to
use), and a level of WEP encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. Last, either generate a
WEP key using the Passphrase or enter the WEP key manually.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
WEP
. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, select a Default Transmit Key
(choose which Key to use), and a level of WEP encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. Then
either generate a WEP key using the Passphrase or enter the WEP key manually.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes. For detailed instructions on configuring wireless security for the Router,
turn to “Appendix B: Wireless Security.”
Figure 5-25: Wireless Tab - Wireless Security (RADIUS)
Figure 5-26: Wireless Tab - Wireless Security (WEP)
IMPORTANT:
If you are using WEP encryption, always
remember that each device in your wireless network
MUST use the same WEP encryption method and
encryption key, or else your wireless network will not
function properly.
radius
(remote authentication dial-in user service): a protocol
that uses an authentication server to control network access.
wep
(wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network for greater security.
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 95
27
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Wireless MAC Filter
Wireless-G Media Storage Link Router with SpeedBooster
The Wireless Tab - Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your
network’s radius.
Wireless MAC Filter
Wireless MAC Filter
. To filter wireless users by MAC Address, either permitting or blocking access, click
Enable
.
If you do not wish to filter users by MAC Address, select
Disable
.
Prevent
. Clicking this button will block wireless access by MAC Address.
Permit Only
. Clicking this button will allow wireless access by MAC Address.
Edit MAC Address Filter List
. Clicking this button will open the MAC Address Filter List. On this screen, you can
list users, by MAC Address, to whom you wish to provide or block access. For easy reference, click the
Wireless
Client MAC List
button to display a list of network users by MAC Address.
After you have made your changes, click the
Save Settings
button to apply your changes, or click the
Cancel
Changes
button to cancel your changes.
Figure 5-28: MAC Address Filter List
Figure 5-27: Wireless Tab - Wireless MAC Filter
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 95
28
Chapter 6: Configuring the Wireless-G Media Storage Link Router
The Wireless Tab - Advanced Wireless Settings
Wireless-G Media Storage Link Router with SpeedBooster
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Advanced Wireless
Authentication Type
. The default is set to
Auto
, which allows either Open System or Shared Key authentication
to be used. With
Open System
authentication, the sender and the recipient do NOT use a WEP key for
authentication. With
Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Basic Rate
. The Basic Rate setting is not actually one rate of transmission but a series of rates at which the
Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so
they know which rates will be used. The Router will also advertise that it will automatically select the best rate
for transmission. The default setting is
Default
, when the Router can transmit at all standard wireless rates
(1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Other options are
1-2Mbps
, for use with older wireless
technology, and
All
, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of
data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate
setting.
Transmission Rate
. The rate of data transmission should be set depending on the speed of your wireless
network. You can select from a range of transmission speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will
negotiate the best possible connection speed between the Router and a wireless client. The default value is
Auto
.
CTS Protection Mode
. CTS (Clear-To-Send) Protection Mode should remain disabled unless you are having
severe problems with your Wireless-G products not being able to transmit to the Router in an environment with
heavy 802.11b traffic. This function boosts the Router’s ability to catch all Wireless-G transmissions but will
severely decrease performance.
Frame Burst
. Enabling this option should provide your network with greater performance, depending on the
manufacturer of your wireless products. If you are not sure how to use this option, keep the default,
Disable
.
Beacon Interval
. The default value is
100
. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval
. This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it
Figure 5-29: Wireless Tab - Advanced Wireless Settings
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top