Page 116 / 414 Scroll up to view Page 111 - 115
Wireless Configuration and Security
116
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
4.
Click
Apply
to save your settings. The new profile is added to the List of Available Wireless
Profiles table on the Wireless Profiles screen.
WARNING:
If you use a wireless computer to configure wireless security
settings, you will be disconnected when you click Apply.
Reconfigure your wireless computer to match the new settings, or
access the wireless VPN firewall from a wired computer to make
further changes.
Note:
For information about how to configure WPS, see
Configure Wi-Fi
Protected Setup
on page 120.
WEP Index and Keys
Authentication
Specify the authentication by making a selection from the drop-down list:
Open System
. Select this option to use WEP encryption without
authentication.
Shared Key
. Select this option to use WEP authentication and encryption
with a shared key (passphrase).
Encryption
Select the encryption key size by making a selection from the drop-down list:
64-bit WEP
. Standard WEP encryption, using 40/64-bit encryption.
128-bit WEP
. Standard WEP encryption, using 104/128-bit encryption.
Passphrase
Enter a passphrase. The passphrase length needs to be between 8 and
63 characters (inclusive). The secret passphrase allows you to automatically
generate the keys by clicking
Generate
.
Encryption Key
(Key1–Key4)
Specify the active key by selecting one of the four radio buttons. Only one key
can be the active key. Either enter a key manually or generate the key
automatically by clicking
Generate
. The length of the key depends on the
selected encryption:
64-bit WEP
. A key length of 5 ASCII or 10 hexadecimal characters.
128-bit WEP
. A key length of 13 ASCII or 26 hexadecimal characters.
Note:
Wireless stations need to use the key to access the wireless VPN
firewall.
Table 28.
Add Wireless Profiles screen settings (continued)
Setting
Description
Page 117 / 414
Wireless Configuration and Security
117
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
To edit a wireless profile:
1.
On the Wireless Profiles screen (see
Figure 54
on page 112), click the
Edit
button in the
Action column for the wireless profile that you want to modify. The Edit Profiles screen
displays. This screen is identical to the Add Profiles screen.
2.
Modify the settings as explained in the previous table.
3.
Click
Apply
to save your settings.
Note:
If WPS is enabled for the wireless profile, first disable WPS before
you edit the wireless profile.
To delete one or more wireless profiles:
1.
On the Wireless Profiles screen (see
Figure 54
on page 112), select the check box to
the left of each wireless profile that you want to delete, or click the
Select All
table
button to select all wireless profiles. (You cannot select the default wireless profile.)
2.
Click the
Delete
table button.
Note:
If WPS is enabled for the wireless profile, first disable WPS before
you delete the wireless profile.
To enable or disable one or more wireless profiles:
1.
On the Wireless Profiles screen (see
Figure 54
on page 112), select the check box to
the left of each wireless profile that you want to enable or disable, or click the
Select All
table button to select all wireless profiles.
2.
Click one of the following table buttons:
Enable
. Enables the wireless profile or wireless profiles and allows wireless clients to
make a connection.
Disable
. Disables the wireless profile or wireless profiles and prevents wireless
clients from making a connection.
Restrict Wireless Access by MAC Address
For increased security, you can restrict access to an SSID by allowing access to only specific
computers or wireless stations based on their MAC addresses. You can restrict access to
only trusted computers so that unknown computers cannot wirelessly connect to the wireless
VPN firewall. MAC address filtering adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed.
Page 118 / 414
Wireless Configuration and Security
118
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Note:
For wireless adapters, you can usually find the MAC address printed
on the wireless adapter.
To allow or restrict access based on MAC addresses:
1.
On the Wireless Profiles screen (see
Figure 54
on page 112), click the
ACL
button in the
ACL column for the wireless profile for which you want to set up access control. The
MAC Address Filtering screen displays. (The following figure shows some examples.)
Figure 56.
2.
Click
Add
to open the MAC Address screen (not shown in this manual).
3.
Enter a MAC address in the MAC Address field.
4.
Click
Apply
to add the MAC address to the MAC Address table on the MAC Address
Filtering screen.
5.
Repeat
Step 2
through
Step 4
for any other MAC address that you want to add to the MAC
Address table.
6.
From the ACL Policy Status drop-down list, select if access control is enabled, and if so, how
the MAC addresses in the MAC Address table are treated:
Open
. Access control is disabled. All MAC addresses, including the ones in the MAC
Address table, are allowed access.
Allow
. Only the MAC addresses in the MAC Address table are allowed access. All
other MAC addresses are denied access.
Deny
. The MAC addresses in the MAC Address table are denied access. All other
MAC addresses are allowed access.
7.
Click
Apply
to save your settings.
Page 119 / 414
Wireless Configuration and Security
119
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
WARNING:
When configuring the wireless VPN firewall from a wireless
computer whose MAC address is not in the access control list and
when the ACL policy status is set to deny access, you will lose
your wireless connection when you click Apply. You then need to
access the wireless VPN firewall from a wired computer or from a
wireless computer that is on the access control list to make any
further changes.
To remove one or more MAC addresses from the table:
1.
In the MAC Address table, select the check box to the left of each MAC address that
you want to delete, or click the
Select All
table button to select all MAC addresses.
2.
Click the
Delete
table button.
View the Status of a Wireless Profile
To view the status of a specific wireless profile:
On the Wireless Profiles screen (see
Figure 54
on page 112), click the
Status
button in the
Status column for the wireless profile for which you want to display the status information.
The Access Point screen displays:
Figure 57.
Note:
On the Access Point screen, the wireless profile is stated in the AP
Name column: the first wireless profile is indicated by ap1, the
second by ap2, and so on.
Page 120 / 414
Wireless Configuration and Security
120
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
The following table explains the fields of the Access Point Status screen.
To change the poll interval period, enter a new value in the Poll Interval field, and then click
Set interval
. To stop polling, click
Stop
.
Configure Wi-Fi Protected Setup
Push 'N' Connect using Wi-Fi Protected Setup™ (WPS) allows you to connect computers to a
secure wireless network with WPA or WPA2 wireless security. The wireless VPN firewall
automatically sets security for each computer or device that uses WPS to join the wireless
network. To use WPS, make sure that your wireless devices are Wi-Fi certified and support
WPS. NETGEAR products that use WPS call it Push 'N' Connect.
You can use a WPS button or the wireless router interface method to add wireless computers
and devices to your wireless network.
Table 29.
Access Point screen fields
Item
Description
Access Point
AP Name
The names for the four wireless profiles are ap1, ap2, ap3, and ap4.
Radio
The radio to which the client is connected. By default, the radio is always 1, indicating the
2.4 GHz radio.
Packet
The number of received (rx) and transmitted (tx) packets on the access point in bytes.
Bytes
The number of received (rx) and transmitted (tx) bytes on the access point.
Errors
The number of received (rx) and transmitted (tx) errors on the access point.
Dropped
The number of received (rx) and transmitted (tx) dropped packets on the access point.
Multicast
The number of received (rx) and transmitted (tx) multicast packets on the access point.
Collisions
The number of signal collisions that have occurred on the access point. A collision occurs
when the access point attempts to send data at the same time as a wireless station that is
connected to the access point.
Connected Clients
MAC Address
The MAC address of the client.
Radio
The radio to which the client is connected. By default, the radio is always 1, indicating the
2.4 GHz radio.
Security
The type of security that the client is using (Open, WEP, WPA, WPA2, or WPA+WPA2).
Encryption
The type of encryption that the client is using (CCMP, TKIP, or TKIP + CCMP).
Authentication
The type of authentication that the client is using (Open, PSK, RADIUS, or PSK+RADIUS).
Time
Connected
The period in minutes since the connection was established between the access point and the
client.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top