Page 66 / 106 Scroll up to view Page 61 - 65
System Configuration
5-32
5
-
WPA
or
WPA1/WPA2
: Defines a transitional mode of operation for networks
moving from WPA security to WPA2. WPA1/WPA2 Enterprise Mode allows both
WPA1 and WPA2 clients to associate to a common SSID interface. In WPA1/
WPA2 mixed mode, the unicast encryption cipher (TKIP or AES-CCMP) is
negotiated for each client. The access point advertises its supported encryption
ciphers in beacon frames and probe responses. WPA1 and WPA2 clients select
the cipher they support and return the choice in the association request to the
access point. For mixed-mode operation, the cipher used for broadcast frames
is always TKIP. WEP encryption is not allowed.
-
802.1x
: IEEE 802.1X is a standard framework for network access control that
uses a central RADIUS server for user authentication. This control feature
prevents unauthorized access to the network by requiring an 802.1X client
application to submit user credentials for authentication. The 802.1X standard
uses the Extensible Authentication Protocol (EAP) to pass user credentials
(either digital certificates, user names and passwords, or other) from the client
to the RADIUS server. Client authentication is then verified on the RADIUS
server before the access point grants client access to the network.
Page 67 / 106
Wireless Settings
5-33
5
Encryption Type
– Selects the data encryption type to use. (Default: determined
by the Security Mode selected)
-
None
: Disables data encryption.
-
WEP
: Selects WEP keys for data encryption.
-
TKIP
: Uses Temporal Key Integrity Protocol (TKIP) keys for encryption. WPA
specifies TKIP as the data encryption method to replace WEP. TKIP avoids the
problems of WEP static keys by dynamically changing data encryption keys.
-
AES
: Uses Advanced Encryption Standard (AES) keys for encryption. WPA2
uses AES Counter-Mode encryption with Cipher Block Chaining Message
Authentication Code (CBC-MAC) for message integrity. The AES
Counter-Mode/CBCMAC Protocol (AES-CCMP) provides extremely robust data
confidentiality using a 128-bit key. Use of AES-CCMP encryption is specified as
a standard requirement for WPA2. Before implementing WPA2 in the network,
be sure client devices are upgraded to WPA2-compliant hardware.
-
TKIP/AES
: Uses either TKIP or AES keys for encryption. WPA/WPA2 mixed
modes allow both WPA and WPA2 clients to associate to a common SSID
interface. In mixed mode, the unicast encryption cipher (TKIP or AES-CCMP) is
negotiated for each client.
Default Key ID
– Sets the WEP key used
for authentication.
(Default: 1; Range: 1~4)
Page 68 / 106
System Configuration
5-34
5
Key 1 ~ Key 4
– Sets WEP key values.
The user must first choose between ASCII
or Hexadecimal keys. At least one key
must be specified. Each WEP key has an
index number. The selected key is used
for authentication and encryption on the
VAP interface. Enter key values that
match the key type and length settings.
Standard keys are either 5 or 13
alphanumeric characters; or 10 or 26
hexadecimal digits. (Default: ASCII, no prese
t value)
RADIUS
Remote Authentication Dial-in User Service (RADIUS) is an authentication protocol
that uses software running on a central server to control access to RADIUS-aware
devices on the network. An authentication server contains a database of user
credentials for each user that requires access to the network.
A RADIUS server must be specified for the access point to implement IEEE 802.1X
network access control and Wi-Fi Protected Access (WPA) wireless security.
Click “WLAN1/WLAN2 Security” and be sure that an ‘Enterprise” mode is selected.
Note:
This guide assumes that you have already configured RADIUS server(s) to
support the access point. Configuration of RADIUS server software is beyond the
scope of this guide, refer to the documentation provided with the RADIUS server
software.
Figure 5-23.
RADIUS Settings
RADIUS Setting
— Configures RADIUS server settings.
Note:
RADIUS settings only apply to WPA, WPA2, or WPA/WPA2 Enterprise
modes.
RADIUS Server IP Address
– Specifies the IP address of the RADIUS server.
RADIUS Server Port
– The User Datagram Protocol (UDP) port number used by
the RADIUS server for authentication messages. (Range: 1024-65535;
Default: 1812)
Page 69 / 106
Wireless Settings
5-35
5
RADIUS Server Shared Secret
– A shared text string used to encrypt messages
between the access point and the RADIUS server. Be sure that the same text string
is specified on the RADIUS server. Do not use blank spaces in the string.
(Maximum length: 20 characters)
RADIUS Server Session Timeout
– Number of seconds the access point waits
for a reply from the RADIUS server before resending a request. (Range: 1-60
seconds; Default: 0)
Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) is designed to ease installation and activation of
security features in wireless networks. WPS has two basic modes of operation,
Push-button Configuration (PBC) and Personal Identification Number (PIN). The
WPS PIN setup is optional to the PBC setup and provides more security. The WPS
button on the wireless AP/Router can be pressed at any time to allow a single device
to easily join the network.
Note:
WPS settings only apply to WLAN1.
The WPS Settings page includes configuration options for setting WPS device PIN
codes and activating the virtual WPS button.
Click on “Wireless Settings,” followed by ‘WPS”.
Figure 5-24.
WPS Settings
Page 70 / 106
System Configuration
5-36
5
WPS Function
— Enables WPS, locks security settings, and refreshes WPS
configuration information.
WPS
– Enables WPS. (Default: Disable)
WPS Summary
– Provides detailed WPS statistical information.
WPS Current Status
– Displays if there is currently any WPS traffic connecting to
the wireless AP/Router. (Options: Start WSC Process; Idle; Default: Idle)
WPS Configured
– States if WPS for wireless clients has been configured for this
device. (Default: no)
WPS SSID
– The service set identifier for WLAN1. (Default: SMC)
WPS Auth Mode
– The method of authentication used. (Default: Open)
WPS Encryp Type
– The encryption type used for WLAN1. (Default: None)
WPS Default Key Index
– Displays the WEP default key (1~4).
WPS Key (ASCII)
– Displays the WPS security key (ASCII) which can be used to
ensure the security of the wireless network.
AP PIN
– Displays the PIN Code for the wireless AP/Router. The default is
exclusive for each unit. (Default: 61461345)
Figure 5-25.
WPS Progress Settings
WPS Configuration
— Configures WPS settings for the wireless AP/Router.
WPS Mode
– Selects between methods of broadcasting the WPS beacon to
network clients wanting to join the network:
-
PIN
: The wireless AP/Router, along with other WPS devices, such as notebook
PCs, cameras, or phones, all come with their own eight-digit PIN code. When
one device, the WPS enrollee, sends a PIN code to the wireless AP/Router, it
becomes the WPS registrar. After configuring PIN-Code information you must
press “Apply” to send the beacon, after which you have up to two minutes to
activate WPS on devices that need to join the network.
-
PBC
: This has the same effect as pressing the physical WPS button that is
located on the front of the wireless AP/Router. After checking this option and
clicking “Apply” you have up to two minutes to activate WPS on devices that
need to join the network.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top