Page 61 / 86 Scroll up to view Page 56 - 60
B
8 •
Parental Control Pages
60
Parental Control Event Log Page
This page displays the Parental Control event log report. The event log is a running list of
the last 30 Parental Control access violations, which include the following items on
Internet traffic:
If the user’s Internet access is blocked (time filter)
If a blocked keyword is detected in the URL
If a blocked domain is detected in the URL
If the online lookup service detects that the URL falls under a blocked category
Page 62 / 86
B
9 •
Wireless Pages
61
9
Wireless Pages
The SBG901 Wireless Pages allow you to configure your wireless LAN (WLAN).
You can click any Wireless submenu option to view or change the configuration
information for that option. WPA or WPA2 encryption provides higher security than WEP
encryption, but older wireless client cards may not support the newer WPA or WPA2
encryption methods.
Wireless 802.11 Radio Page
This page allows you to configure the Wireless Radio parameters, including the current
country and channel number.
Field Descriptions for the Wireless 802.11 Radio Page
Field
Description
Wireless Interfaces
Shows the MAC address of the installed wireless card. It is not
configurable.
Wireless
Shows if the wireless network is enabled or disabled.
Country
Restricts the channel set based on the country’s regulatory
requirements. This is a display-only field.
Output Power
Sets a percentage of the output power of the hardware’s
maximum capability.
Channel
Selects the channel for access point (AP) operation. The list of
available channels depends on the designated country.
For this field, the channel selected on the wireless clients on
your WLAN must be the same as the one selected on the
SBG901.
Page 63 / 86
B
9 •
Wireless Pages
62
Wireless 802.11 Primary Network Page
This page allows you to configure the Primary wireless network.
Field Descriptions for the Wireless 802.11 Primary Network Page
Field
Description
Primary Network
When set to
Enabled
, beacon frames are transmitted with
the Primary Network SSID.
Network Name (SSID)
Sets the Network Name (also known as SSID) of the Primary
wireless network. This is a 1-32 ASCII character string.
Closed Network
With a closed network, users type the SSID into the client
application instead of selecting the SSID from a list. This
feature makes it slightly more difficult for the user to gain
access.
WPA
Enables or disables Wi-Fi Protected Access encryption.
WPA-PSK
Enables or disables a local WPA pre-shared key passphrase.
WPA2
Enables or disables Wi-Fi Protected Access 2 encryption.
WPA2-PSK
Enables or disables a local WPA2 pre-shared key passphrase.
Page 64 / 86
B
9 •
Wireless Pages
63
Field
Description
WPA/WPA2 Encryption
When using WPA or WPA2 authentication, these WPA
encryption modes can be set: TKIP, AES, or TKIP + AES. AES
(Advanced Encryption Standard) provides the strongest
encryption, while TKIP (Temporal Key Integrity Protocol)
provides strong encryption with improved compatibility. The
TKIP + AES mode allows both TKIP and AES-capable clients
to connect.
WPA Pre-Shared Key
Show Key
Sets the WPA Pre-Shared Key (PSK). This is either an 8-63
ASCII character string or a 64-digit hex number. This is
specified when the Network Authentication method is WPA-
PSK.
Show Key
- When selected, the WPA Pre-Shared Key is
displayed.
RADIUS Server
Sets the RADIUS server IP address to use for client
authentication using the dotted-decimal format
(xxx.xxx.xxx.xxx).
RADIUS Port
Sets the UDP port number of the RADIUS server. The default
is 1812.
RADIUS Key
Sets the shared secret for the RADIUS connection. The key is
a 0 to 255 character ASCII string.
Group Key Rotation Interval
Sets the WPA Group Rekey Interval in seconds. Set to zero to
disable periodic rekeying.
WPA/WPA2 Re-auth Interval
The re-authentication interval is the amount of time the
wireless router can wait before re-establishing authentication
with the CPE.
WEP Encryption
WEP Encryption enables or disables Wired Equivalent Privacy
encryption.
Shared Key Authentication
The WEP protocol uses Shared Key Authentication, which is
an Authentication protocol where the CPE sends an
authentication request to the access point. Then, the access
point sends a challenge text to the CPE.
The CPE uses either the 64-bit or 128-bit key to encrypt the
challenge text and sends the encrypted text to the access
point. The access point will decrypt the encrypted text and
then compare the decrypted message with the original
challenge text. If they are the same, the access point will let
the CPE connect; if it doesn’t match, then the access point
does not let the CPE connect.
Page 65 / 86
B
9 •
Wireless Pages
64
Field
Description
802.1x Authentication
This is another type of authentication and is used on top of
WEP. 802.1x Authentication is a much stronger type of
authentication than WEP.
Network Key 1 – 4
Sets the static WEP keys when WEP encryption is enabled.
Enter five ASCII characters or 10 hexadecimal digits for a
64-bit key.
Enter 13 ASCII characters or 26 hexadecimal digits for a
128-bit key.
When both WPA encryption and WEP encryption are enabled,
only keys 2 and 3 are available for WEP encryption.
Current Network Key
Selects the encryption (transmit) key when WEP encryption is
enabled.
PassPhrase
Sets the text to use for WEP key generation.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top