Page 31 / 107 Scroll up to view Page 26 - 30
24
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Wireless Security
Wireless-G Broadband Router with 2 Phone Ports
WPA2 Personal
. WPA2 gives you two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of algorithm,
AES
, or
TKIP +
AES
. Enter a WPA Shared Key of 8-63 characters. Then enter a Group Key
Renewal period, which instructs the Router how often it should change the encryption keys.
WPA2 Enterprise
. This option features WPA2 used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
AES
, or
TKIP +
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between the
Router and the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change
the encryption keys.
Figure 5-20: Wireless Tab - Wireless Security
(WPA2 Personal)
Figure 5-21: Wireless Tab - Wireless Security
(WPA2 Enterprise)
Downloaded from
www.Manualslib.com
manuals search engine
Page 32 / 107
25
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Wireless Security
Wireless-G Broadband Router with 2 Phone Ports
RADIUS
. This option features WEP used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) First, enter the RADIUS server’s IP Address and port number, along
with a key shared between the Router and the server. Then, select a Default Transmit Key (choose which Key to
use), and a level of WEP encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. Last, either generate a
WEP key using the Passphrase or enter the WEP key manually.
WEP
. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, select a Default Transmit Key
(choose which Key to use), and a level of WEP encryption,
64 bits 10 hex digits
or
128 bits 26 hex digits
. Then
either generate a WEP key using the Passphrase or enter the WEP key manually.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. For detailed instructions on configuring wireless security for the Router, turn to
“Appendix B: Wireless Security.”
Figure 5-22: Wireless Tab - Wireless Security (RADIUS)
Figure 5-23: Wireless Tab - Wireless Security (WEP)
IMPORTANT:
If you are using WEP
encryption, always remember that each
device in your wireless network MUST use
the same WEP encryption method and
encryption key, or else your wireless network
will not function properly.
Downloaded from
www.Manualslib.com
manuals search engine
Page 33 / 107
26
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Wireless MAC Filter
Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your
network’s radius.
Wireless MAC Filter
. To filter wireless users by MAC Address, either permitting or blocking access, click
Enable
.
If you do not wish to filter users by MAC Address, select
Disable
.
Prevent
. Clicking this button will block wireless access by MAC Address.
Permit Only
. Clicking this button will allow wireless access by MAC Address.
Edit MAC Address Filter List
. Clicking this button will open the MAC Address Filter List. On this screen, you can
list users, by MAC Address, to whom you wish to provide or block access. For easy reference, click the
Wireless
Client MAC List
button to display a list of network users by MAC Address.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 5-25: MAC Address Filter List
Figure 5-24: Wireless Tab - Wireless MAC Filter
Downloaded from
www.Manualslib.com
manuals search engine
Page 34 / 107
27
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Advanced Wireless Settings
Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Authentication Type
. The default is set to
Auto
, which allows either Open System or Shared Key authentication
to be used. With
Open System
authentication, the sender and the recipient do NOT use a WEP key for
authentication. With
Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Basic Rate
. The Basic Rate setting is not actually one rate of transmission but a series of rates at which the
Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so
they know which rates will be used. The Router will also advertise that it will automatically select the best rate
for transmission. The default setting is
Default
, when the Router can transmit at all standard wireless rates
(1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Other options are
1-2Mbps
, for use with older wireless
technology, and
All
, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of
data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate
setting.
Transmission Rate
. The rate of data transmission should be set depending on the speed of your wireless
network. You can select from a range of transmission speeds, or you can select
Auto
to have the Router
automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will
negotiate the best possible connection speed between the Router and a wireless client. The default value is
Auto
.
CTS Protection Mode
. CTS (Clear-To-Send) Protection Mode should remain disabled unless you are having
severe problems with your Wireless-G products not being able to transmit to the Router in an environment with
heavy 802.11b traffic. This function boosts the Router’s ability to catch all Wireless-G transmissions but will
severely decrease performance.
Beacon Interval
. The default value is
100
. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval
value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize
the wireless network.
DTIM Interval
. This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message
(DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and
multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it
sends the next DTIM with a DTIM Interval value. Its clients hear the beacons and awaken to receive the broadcast
and multicast messages. The default value is
1
.
Fragmentation Threshold
. This value specifies the maximum size for a packet before data is fragmented into
multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation
Figure 5-26: Wireless Tab - Advanced Wireless Settings
Downloaded from
www.Manualslib.com
manuals search engine
Page 35 / 107
28
Chapter 5: Configuring the Wireless-G Broadband Router with 2 Phone Ports
The Wireless Tab - Advanced Wireless Settings
Wireless-G Broadband Router with 2 Phone Ports
Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor
reduction of the default value is recommended. In most cases, it should remain at its default value of
2346
.
RTS Threshold
. Should you encounter inconsistent data flow, only minor reduction of the default value,
2347
, is
recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS)
frame to acknowledge the right to begin transmission. The RTS Threshold value should remain at its default value
of
2347
.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top