Page 71 / 249 Scroll up to view Page 66 - 70
Network Connections
66
WEP Authentication:
Open System:
Allow any client to authenticate.
Since clients must still have a
valid WEP key in order to send or receive data, this setting does not make the
WEP protocol less secure, and is the recommended setting.
Shared Key:
Clients must use the WEP key to authenticate.
Warning
Due to flaws in the authentication protocol, this method reduces the security of
the WEP key. It is recommended that you use
Open System
authentication
instead.
Open System or Shared Key:
Allows clients to authenticate using either of the
above two methods.
WEP Key Length:
This sets the length of the WEP keys to be entered below.
It is
recommended to use 128 bit keys if possible.
WEP Key:
Enter up to 4 encryption keys.
These must be either 10 hexadecimal digits (0
– 9, A – F) for 64 bit keys, or 26 hexadecimal digits for 128 bit keys.
You must also
select one of the 4 keys to be the default transmit key.
WPA-PSK (aka WPA-Personal) security method
WPA-PSK (Wi-Fi Protected Access Preshared Key) is an authentication and encryption
protocol that fixes the security flaws in WEP.
This is the recommended security method.
WPA Encryption:
Select the encryption algorithm, either
TKIP
(Temporary Key Integrity
Protocol) or
AES
(Advanced Encryption Standard).
WPA Key:
Enter the WPA preshared key, which can be either 8 to 63 ASCII characters,
or 64 hexadecimal characters.
ACL (Access Control List)
When the
Access Control List
is disabled, any wireless client with the correct ESSID
(and encryption key if applicable) can connect to the wireless network.
For additional
security, you can specify a list of MAC address to either allow or deny.
Page 72 / 249
Network Connections
67
Warning
This is only a weak form of authentication, and does not provide any data privacy
(encryption).
Advanced
Region:
Select the region that the access point is operating in.
This will restrict the
allowable frequencies and channels.
If your region is not listed, then contact your local
communications authority to see which setting is appropriate for your region.
Protocol:
802.11b only:
Wireless clients can only connect using 802.11b (11mbit/s).
Note
that most wireless clients which support 802.11g will also support 802.11b.
802.11g only:
Wireless clients can only connect using 802.11g (54 mbit/s).
Wireless clients that only support 802.11b will not be able to connect.
802.11b and 802.11g:
Both 802.11b and 802.11g wireless clients can connect.
Transmit Power (%):
Select the transmit power for the access point.
Reducing this may
reduce interference caused to other nearby access points.
Preamble Type:
The preamble is part of the physical wireless protocol.
Using a short
preamble can give higher throughput.
However, some wireless clients may not support
short preambles.
Enable RTS, RTS Threshold, Enable Fragmentation, Fragmentation length, Beacon
Interval (ms), DTIM Interval (beacons):
These settings should only be modified as
directed by support.
Page 73 / 249
Network Connections
68
Connecting Wireless Clients to your LAN
The following steps detail how to configure your CyberGuard SG appliance to bridge
between its wireless and LAN interfaces.
The result of this configuration would be similar
to attaching a wireless access point in bridge mode to one of the CyberGuard SG
appliance’s LAN ports.
Individual settings and fields are detailed earlier in the
Wireless
section.
Click
Network Setup
.
Select
Edit Wireless configuration
from the
Configuration
pull
down box for the
Wireless
interface.
Figure 3-7
Enter an appropriate
ESSID
and select a
Channel
for your wireless network.
Typically,
you will want to enable
Bridge Between Clients
,
and there is generally no reason not to
Broadcast ESSID
, so enable this setting too.
Take note of the
ESSID
and
Channel
, you
will need them to configure the wireless clients.
Select
WPA-PSK
as the
Security Method
, select
AES
for
WPA Encryption
if your
wireless clients support it, otherwise select
TKIP
.
Enter a
WPA Key
of 8 to 63 ASCII
characters, or 64 hexadecimal characters.
Take note of the
WPA Key
and
WPA
Encryption
method, you will need is to configure the wireless clients.
Click
Apply
.
Click
ACL
.
Page 74 / 249
Network Connections
69
Figure 3-8
Select
Allow authentication for MACs in the Access Control List
and click
Apply
.
Add
the MAC address of each wireless client you wish to allow to connect.
Click
Advanced
.
Ensure the
Region
has been set appropriately.
You may also restrict
the
Protocol
to
802.11b only
or
802.11g only
if you wish.
Generally, the other settings
should be left at their default values.
Click
Apply
.
Click the
Connections
tab.
From the
Configuration
pull down box for the
Wireless
interface, select
Change to Bridged LAN
.
Click
Reboot Now
.
Give the CyberGuard SG appliance a few moments to reboot.
Click the
Connections
tab.
From the
Configuration
pull down box for your
LAN
interface, select
Change to
Bridged LAN
.
Click
Continue
and
Reboot Now
.
Page 75 / 249
Network Connections
70
Note
If your
LAN
interface was previously configured to obtain an IP address automatically
from a DHCP server, the CyberGuard SG appliance will now use the MAC address of the
wireless device when obtaining an IP address.
You may have to update your DHCP
server accordingly.
Configure each wireless client with the
Channel
,
ESSID
,
WPA
Key
and
WPA
Encryption
method.
COM/Modem
With a modem attached, the COM (serial) port can be configured as a primary
Dialout
Internet
connection, to provide
Dialin Access
for remote users, or as a secondary
Failover Dialout Internet
connection that will be activated when your primary Internet
connection becomes unavailable (e.g. ISP equipment or the telecommunications network
may temporarily fail).

Rate

4 / 5 based on 3 votes.

Popular SnapGear Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top