Page 46 / 60 Scroll up to view Page 41 - 45
Chapter 2: Web Configuration
40
WEP Encryption
If you select WEP (64-bit or 128-bit), you can
adjust the following settings-
Shared Key Authentication:
Decide whether to set the shared key
Optional or Required by selecting from the
drop-down menu.
Network Key 1 to 4:
The system allows you to enter four sets of
the WEP key. For 64-bit WEP mode, the key
length is 5 characters or 10 hexadecimal
digits. As for 128-bit WEP mode, the key
length is 13 characters or 26 hexadecimal
digits.
Current Network Key:
Select one set of the network key (from 1 to 4) as the default one.
PassPhrase:
You can enter ASCII codes into this field. The range is from 8 characters to 64 characters.
For ASCII characters, you can key in 63 characters in this field. If you want to key in 64
characters, only hexadecimal characters can be used.
Generate WEP Keys:
Click this button to generate the PassPhrase.
802.1x Authentication
If you enable the 802.1x authentication
function, you will have to offer the following
information-
RADIUS Server:
RADIUS Server is a protocol for carrying
authentication, authorization, and
configuration information between a
Network Access Server which desires to
authenticate its links and a shared
Authentication Server. Please key in the IP
Address for the RADIUS Server.
RADIUS Port:
Besides the IP address of the RADIUS Server,
you have to enter the port number for the
server. Port 1812 is the reserved
RADIUS-authentication port described in
RFC 2138. Earlier AP (RADIUS clients) use
port 1945. The default value will be shown
on this box. You can keep and use it.
RADIUS Key:
A RADIUS Key is like a password, which is used between IAS and the specific RADIUS client
to verify identity. Both IAS and the RADIUS client must be use the same RADIUS Key for
successful communication to occur. Enter the RADIUS Key.
Page 47 / 60
Chapter 2: Web Configuration
Illustrations contained in this document are for representation only.
41
WPA/WPA2
For the WPA/WPA2 network Authentication,
the settings that you can adjust including
WPA/WPA2 Encryption, RADIUS Server,
RADIUS Port, RADIUS Key, Group Key
Rotation Interval, and WPA/WPA2 Re-auth
Interval.
WPA/WPA2 Encryption:
There are three types that you can choose,
TKIP*, AES**, TKIP+AES.
* TKIP takes the original master key only as a
starting point and derives its encryption
keys mathematically from this mater key.
Then it regularly changes and rotates the
encryption keys so that the same encryption
key will never be used twice
** AES provides security between client
workstations operating in ad hoc mode. It
uses a mathematical ciphering algorithm
that employs variable key sizes of 128, 192
or 256 bits.
RADIUS Server/RADIUS Port/RADIUS Key:
Please refer to the previous page.
Group Key Rotation Interval:
Key in the time for the WAP group key rotation interval. The unit is second. With increasing
rekey interval, user bandwidth requirement is reduced.
WPA/WPA2 Re-auth Interval:
When a wireless client has associated with the Residential Voice Gateway for a period of
time longer than the setting here, it would be disconnected and the authentication will be
executed again. The default value is
3600
, you may modify it.
WPA-PSK/ WPA2-PSK
For the WPA-PSK/WPA2-PSK network
Authentication, the settings that you can
adjust including WPA/WPA2 Encryption,
WPA Pre-Shared Key, and Group key
Rotation Interval.
WPA Pre-Shared Key:
Please type the key to be between 8 and 63
characters, or 64 hexadecimal digits. Only
the devices with a matching key that you set
here can join this network.
WPA/WPA2 Encryption & WPA Group Rekey
Interval:
Please refer to the WPA/WPA2 part.
Page 48 / 60
Chapter 2: Web Configuration
42
Access Control
This page allows you to make access control to the AP or connected clients by offering the MAC
Addresses of the clients.
MAC Restrict Mode:
Click Disabled to welcome all of the clients on the network; select Allow to permit only the
clients on the list to access the cable modem; or choose Deny to prevent the clients on the
list to access this device.
MAC Address:
Enter the MAC addresses of the connected clients into the fields, and then click Apply to
add them to the list for access control.
Apply:
After proper configuration, click Apply to invoke the settings.
Connected Clients:
The information of current connected clients will be displayed here.
Page 49 / 60
Chapter 2: Web Configuration
Illustrations contained in this document are for representation only.
43
Advanced
This page allows you to configure the data rates and Wi-Fi thresholds.
54g
TM
Network Mode:
There are three modes for you to choose, please check the specification of your wireless
card and choose a proper setting.
54g
TM
Protection:
Select Auto to turn on the 54g
TM
protection; select Off to turn down the protection.
Xpress
TM
Technology:
When Xpress is turned on, aggregate throughput (the sum of the individual throughput
speeds of each client on the network) can improve by up to 27% in 802.11g-only networks,
and up to 75% in mixed networks comprised of 802.11g and 802.11b standard equipment.
Click Enabled to start this function; choose Disabled to close this function.
Afterburner
TM
Technology:
When enabled, the data transmission will be faster for the clients. Yet, the clients must
support 125Mbps throughput, then you can choose Enabled. Otherwise, choose Disabled.
Rate:
It decides the speed of data transmission. There are several rates provided here for you to
choose. Choose any one of it according to your needs by using the drop-down menu.
Output Power:
This setting decides the output power of this device. You may use it to economize on
electricity by selecting lower percentage of power output.
Beacon Interval:
Set the period of beacon transmissions to allow mobile stations to locate and identify a BSS.
The measure unit is “time units” (TU) of 1024 microseconds.
DTIM Interval:
The value you set here is used to inform mobile stations when multicast frames that have
been buffered at the Residential Voice Gateway will be delivered and how often that delivery
occurs.
Page 50 / 60
Chapter 2: Web Configuration
44
Fragmentation Threshold:
Set the number of the fragmenting frames to make the data to be delivered without errors
induced by the interference. Frames longer than the value you set here are fragmented
before the initial transmission into fragments no longer than the value of the threshold.
RTS Threshold:
Set the value for sending a request to the destination. All the frames of a length greater
than the threshold that you set here will be sent with the four-way frame exchange. And, a
length less than or equal to the value that you set will not be proceeded by RTS.
Apply:
After proper configuration, click Apply to invoke the settings.
Bridging
This page allows you to configure the WDS features.
WDS (Wireless Distribution System) is a system that enables the interconnection of access points
wirelessly. It may also be referred to as repeater mode because it appears to bridge and accept
wireless clients at the same time (unlike traditional bridging).
Wireless Bridging:
Choose Disabled to shutdown this function; select Enabled to turn on the function of WDS.
Remote Bridges:
Enter the MAC Addresses of the remote Bridges to relay the signals for each other.
Apply:
After proper configuration, click Apply to invoke the settings.

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top