Page 36 / 120 Scroll up to view Page 31 - 35
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
3-13
Basic Installation and Configuration
202-10060-01, September 2004
Understanding Wireless Security Options
The table below identifies the various basic wireless security options. A full explanation of these
standards is available in
Appendix B, “Wireless Networking Basics”
.
Table 3-1.
Basic Wireless Security Options
Field
Description
Off
No wireless security.
WEP
WEP offers the following options:
Open System
With Open Network Authentication and 64- or 128-bit WEP Data Encryption, the
WG602 v3
does
perform 64- or 128-bit data encryption but
does not
perform any
authentication.
Shared Key
Shared Key authentication encrypts the SSID and data.
Choose the Encryption Strength (64- or 128-bit data encryption). Manually enter
the key values or enter a word or group of printable characters in the Passphrase
box. Manually entered keys
are
case sensitive but passphrase characters
are not
case sensitive.
Note
: Not all wireless adapter configuration utilities support passphrase key
generation.
• Auto
WPA-PSK
WPA-Pre-shared Key
does
perform authentication, uses 128-bit data encryption
and dynamically changes the encryption keys making it nearly impossible to
circumvent.
Enter a word or group of printable characters in the Password Phrase box. These
characters
are
case sensitive.
Note
: Not all wireless adapter configuration utilities support WPA. Furthermore,
client software is required on the client. Windows XP and Windows 2000 with
Service Pack 3 do include the client software that supports WPA. Nevertheless, the
wireless adapter hardware and driver must also support WPA.
Page 37 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
Basic Installation and Configuration
3-14
202-10060-01, September 2004
Information to Gather Before Changing Basic Wireless Settings
Before customizing your wireless settings, print this form and record the following information. If
you are working with an existing wireless network, the person who set up or is responsible for the
network will be able to provide this information. Otherwise, you will choose the settings for your
wireless network. Either way, record the settings for your wireless network in the spaces below.
Wireless Network Name (SSID)
:
______________________________
The SSID, identifies
the wireless network. You can use up to 32 alphanumeric characters. The SSID is case
sensitive. The SSID in the wireless adapter card must match the SSID of the wireless access
point. In some configuration utilities (such as in Windows XP), the term “wireless network
name” is used instead of SSID.
If WEP Authentication is Used.
Circle one:
Open System
,
Shared Key, or Auto
.
Note:
If you select Shared Key, the other devices in the network will not connect unless they
are set to Shared Key as well and are configured with the correct key.
WEP Encryption key size
. Choose one:
64-bit
or
128-bit
. Again, the encryption key size
must be the same for the wireless adapters and the wireless access point.
Data Encryption (WEP) Keys
. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces below.
Passphrase method
. ______________________________
These characters
are
case
sensitive. Enter a word or group of printable characters and click the Generate Keys
button. Not all wireless devices support the passphrase method.
Manual method
. These values
are not
case sensitive. For 64-bit WEP, enter 10 hex
digits (any combination of 0-9 or a-f). For 128-bit WEP, enter 26 hex digits.
Key 1: ___________________________________
Key 2: ___________________________________
Key 3: ___________________________________
Key 4: ___________________________________
If WPA-PSK Authentication is Used.
Passphrase
: ______________________________
These characters
are
case sensitive.
Enter a word or group of printable characters. When you use WPA-PSK, the other devices
in the network will not connect unless they are set to WPA-PSK as well and are configured
with the correct Passphrase.
Use the procedures described in the following sections to configure the WG602 v3. Store this
information in a safe place.
Page 38 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
3-15
Basic Installation and Configuration
202-10060-01, September 2004
How to Configure WEP Wireless Security
To configure WEP data encryption, follow these steps:
1.
Click the Security Settings link in the Setup section of the main menu and select WEP for the
Security Type.
Figure 3-10: WEP Settings page
2.
The Authentication Type is set to Any by default. Change the Authentication Type to Shared
Key to use WEP data encryption.
3.
For the Encryption Strength, select 64- or 128-bit encryption.
4.
You can manually or automatically program the four data encryption keys. These values must
be identical on all PCs and access points in your network.
Note:
If you use a wireless PC to configure WEP settings, you will be disconnected
when you click Apply. Reconfigure your wireless adapter to match the new settings or
access the wireless access point from a wired PC to make any further changes.
Page 39 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
Basic Installation and Configuration
3-16
202-10060-01, September 2004
Automatic — enter a word or group of printable characters in the Passphrase box and click
the Generate button. The four key boxes will be automatically populated with key values.
Manual — enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F)
Select which of the four keys will be active.
See
“WEP Wireless Security” on page B-4
for a full explanation of each of these options, as
defined by the IEEE 802.11 wireless communication standard.
5.
Click Apply to save your settings.
How to Configure WPA-PSK Wireless Security
Note
: Not all wireless adapters support WPA. Furthermore, client software is also required.
Windows XP and Windows 2000 with service pack 3 do include WPA support. Nevertheless, the
wireless adapter hardware and driver must also support WPA. For instructions on configuring
wireless PCs or PDAs for WPA-PSK security, consult the documentation for the product you are
using.
To configure WPA-PSK, follow these steps:
1.
Click the Security Settings link in the Setup section of the main menu and select WPA-PSK for
the Security Type.
Figure 3-11: WPA Settings menu
2.
Enter a word or group of 8-63 printable characters in the Password Phrase box.
3.
Click Apply to save your settings.
Page 40 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
3-17
Basic Installation and Configuration
202-10060-01, September 2004
How to Restrict Wireless Access by MAC Address
The Access Control page lets you block or allow the network access privilege of the specified
stations through the 54 Mbps Wireless Access Point WG602 v3. This provides an additional layer
of security.
Figure 3-12: Access Control options
To restrict access based on MAC Addresses, follow these steps:
1.
From the Setup section of the main menu, click Access Control to display the Wireless Access
page shown below.
2.
Select the type of Access Control:
Note:
If you use a wireless PC to configure WPA settings, you will be disconnected
when you click Apply. Reconfigure your wireless adapter to match the new settings or
access the wireless access point from a wired PC to make any further changes.
Note:
When configuring the WG602 v3 from a wireless PC whose MAC address is not
in the access control list, if you select Turn Access Control On, you will lose your
wireless connection when you click Apply. You must then access the wireless access
point from a wired PC or from a wireless PC which is on the access control list to make
any further changes.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top