Page 31 / 61 Scroll up to view Page 26 - 30
31
WPA Pre-shared Key
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use
a pre-shared key to authenticate wireless stations and encrypt data during
communication. It uses TKIP or CCMP (AES) to change the encryption key
frequently. So the encryption key is not easy to be cracked by hackers. This is
the best security available.
WPA-Radius
Wi-Fi Protected Access (
WPA
) is an advanced security standard. You can use
an external RADIUS server to authenticate wireless stations and provide the
session key to encrypt data during communication. It uses
TKIP
or CCMP
(
AES
) to change the encryption key frequently. Press
Apply
button when you
are done.
Page 32 / 61
32
ACL
This wireless router supports MAC Address Control, which prevents
unauthorized clients from accessing your wireless network.
Enable wireless access control
Enables the wireless access control function
Adding an address into the list
Enter the "MAC Address" and "Comment"
of the wireless station to be added and then click "Add". The wireless station
will now be added into the "Current Access Control List" below. If you are
having any difficulties filling in the fields, just click "Clear" and both "MAC
Address" and "Comment" fields will be cleared.
Remove an address from the list
If you want to remove a MAC address
from the "Current Access Control List ", select the MAC address that you want
to remove in the list and then click "Delete Selected". If you want to remove
all the MAC addresses from the list, just click the "Delete All" button. Click
"Reset" will clear your current selections.
Click <Apply> at the bottom of the screen to save the above configurations.
You can now configure other sections by choosing Continue, or choose Apply
to apply the settings and reboot the device.
Page 33 / 61
33
WPS
Wi-Fi Protected Setup (WPS) is the simplest way to establish a connection
between the wireless clients and the wireless router. You don’t have to select
the encryption mode and fill in a long encryption passphrase every time when
you try to setup a wireless connection. You only need to press a button on
both wireless client and wireless router, and WPS will do the rest for you.
The wireless router supports two types of WPS: WPS via Push Button and
WPS via PIN code. If you want to use the Push Button, you have to push a
specific button on the wireless client or in the utility of the wireless client to
start the WPS mode, and switch the wireless router to WPS mode. You can
simply push the WPS button of the wireless router, or click the ‘Start to
Process’ button in the web configuration interface. If you want to use the PIN
code, you have to know the PIN code of the wireless client and switch it to
WPS mode, then fill-in the PIN code of the wireless client through the web
configuration interface of the wireless router.
WPS
Check the box to enable WPS function and uncheck it to disable the
WPS function.
Page 34 / 61
34
WPS Current Status
If the wireless security (encryption) function of this
wireless router is properly set, you’ll see a ‘Configured’ message here.
Otherwise, you’ll see ‘UnConfigured’.
Self Pin Code
This is the WPS PIN code of the wireless router. You may need
this information when connecting to other WPS-enabled wireless devices.
SSID
This is the network broadcast name (SSID) of the router.
Authentication Mode
It shows the active authentication mode for the
wireless connection.
Passphrase Key
It shows the passphrase key that is randomly generated by
the wireless router during the WPS process. You may need this information
when using a device which doesn’t support WPS.
WPS via Push Button
Press the button to start the WPS process. The router
will wait for the WPS request from the wireless devices within 2 minutes.
WPS via PIN
You can fill-in the PIN code of the wireless device and press the
button to start the WPS process. The router will wait for the WPS request
from the wireless device within 2 minutes.
Page 35 / 61
35
12
Firewall Settings
The Broadband router provides extensive firewall protection by restricting
connection parameters, thus limiting the risk of hacker attacks, and defending
against a wide array of common Internet attacks. However, for applications that
require unrestricted access to the Internet, you can configure a specific
client/server as a Demilitarized Zone (DMZ).
Note
: To enable the Firewall settings select Enable and click Apply

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top