Page 46 / 76 Scroll up to view Page 41 - 45
Chapter 2: WEB Configuration
Illustrations contained in this document are for representation only.
39
Wireless
Important: Changes to the wireless web pages should be made from a PC that is hard
wired to the gateway, i.e. via Ethernet.
The Wireless web pages group enables a variety of settings that can provide secure and reliable wireless
communications for even the most demanding tech-savvy user.
The TCW770 gateway offers a choice of 802.1x, WPA and WPA-PSK authentication of your PCs to the
gateway, 64 and 128 bit WEP encryption of communication between the gateway and your PCs to
guaranty security, and an Access Control List function that enables you to restrict wireless access to only
your specific PCs.
The wireless function will probably work in your home as shipped from the factory. In addition, the
factory default wireless channel setting may not provide optimum changes are recommended from the
factory defaults, to secure your wireless communications and provide optimum performance.
Performance
Because your wireless communication travels through the air, the factory default wireless channel setting
may not provide optimum performance in your home if you or your neighbors have other interfering
2.4GHz devices such as cordless phones. If your wireless PC is experiencing very sluggish or
dramatically slower communication compared with the speed you achieve on your PC that is wired to the
gateway, try changing the channel number. See the 802.11b/g Radio Web Page discussion below for
details.
Authentication
Authentication enables you to restrict your gateway from communicating with any remote wireless PCs
that aren’t yours. The following minimum authentication
-related changes to factory defaults are
recommended. See the 802.11b/g Radio and Access Control Web Page discussions below for details.
Network Name (SSID)
Set a unique name you choose
Network Type
Set to Open
Access Control List
Enter your wireless PCs’ MAC addresses
Security
Security secures or scrambles messages traveling through the air between your wireless PCs and the
g
ateway, so they can’t be observed by others. The following minimum security setting changes to factory
defaults are recommended. See the 802.11b/g Primary Network Web Page discussion below for details.
Data Encryption
Set to WEP (64-bit)
PassPhrase
Use this feature to generate security keys
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 76
Chapter 2: WEB Configuration
40
Illustrations contained in this document are for representation only.
1.
802.11/ Radio
To set the basic configuration for the wireless features, please click
Radio
item from the
Wireless
menu.
Fig. 30
Interface
: The wireless radio in your gateway can be completely de-activated by changing
Interface
to
Disabled. Click the
Apply
button to save your settings. If you want to re-activate the disabled wireless radio
in your gateway, need to contact cable operator.
Wireless MAC Address
: The MAC address for this wireless device will be displayed in this field
automatically.
Output Power:
This setting decides the output power of this device. You may use it to economize
on electricity by selecting lower percentage of power output. Control the range of the AP by
adjusting the radio output power.
802.11 Band:
It can Support 2.4G and 5G.
802.11n mode:
It will help you to
Enable
or
Disable
the 11N mode. To enable you need to select
Auto
, to
disable you need to select
Off
Bandwidth:
Select wireless channel width 20Mhz is for default value (bandwidth taken by wireless signals of
this access point.)
Sideband for Control Channel (40Mhz only):
There are
Lower
and
Upper
can be selected if Bandwidth
40Mhz is Enabled.
Control Channel
: There are 13 channels that you can choose. Choose the one that is suitable for this device.
Current Channel
: The channel that you choose will be displayed in this field.
Restore Wireless defaults:
To recover to the default settings, press this button to retrieve the settings and
click Apply.
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 76
Chapter 2: WEB Configuration
Illustrations contained in this document are for representation only.
41
2. 802.11/
Primary Network
This page allows you to configure the Network Authentication. It provides several different modes of
wireless security. You will have to enter proper information according to the mode you select.
Fig. 31
Primary Network:
Used to Enable or Disable the whole Primary Network feature.
Network Name (SSID):
By using this you can change the factory default to a name of your choice up to 32
characters long.
Closed Network:
This control is used to hide or reveal your network name (SSID) to any remote, wireless
equipped PC in the area that may be scanning WiFi channels to find available WiFi networks. The gateway WiFi
radio frequently transmits a beacon signal which can contain this network name (SSID). If you set Closed Network
to Enable, your SSID is included in that beacon, and is therefore detectable by any nearby wireless equipped PCs in
the area. The benefit of using Enable is it can speed your WiFi setup on some PCs. If you set Closed Network to
Disable, your SSID is not included in the beacon. This hides your network name (SSID), but as a result may require
a bit more effort on your part to set up your wireless PCs. And when we Enable the
WPS Config
then the
Closed
Network
will be Disabled automatically.
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 76
Chapter 2: WEB Configuration
42
Illustrations contained in this document are for representation only.
WPA (Wi-Fi Protected Access)/WPA2:
It must be used in conjunction with an authentication server such as RADIUS to provide centralized
access control and management. It can provide stronger encryption and authentication solution than none
WPA modes.
WPA2
is the second generation of
WPA
security
WPA-PSK
(WPA-Pre-Shared Key)
/WPA2-PSK
(WPA2-Pre-Shared Key)
:
It is useful for small places without authentication servers such as the network at home. It allows the use
of manually-entered keys or passwords and is designed to be easily set up for home users.
WEP Encryption:
You can choose
64-bit
or
128-bit
according to your needs. If you choose
Disabled
, the Network Keys
will not be shown on this page. If selected, the data is encrypted using the key before being transmitted.
For example, if you set 128-bit in this field, then the receiving station must be set to use the128 Bit
Encryption, and have the same Key value too. Otherwise, it will not be able to decrypt the data.
(
Note: You need to connect one end of the Ethernet cable to the Ethernet port on the back of your
computer, and the other end to the ETHERNET port on the Wireless Gateway.
)
If you select WEP (
64-bit
or
128-bit
), you can adjust the following settings. And by selecting
Disable
you can disable WEP Encryption.
Shared Key Authentication
: Decide whether to set the shared key
Optional
or
Required
by
selecting from the drop-down menu.
Network Key 1 to 4:
The system allows you to enter four sets of the WEP key. For
64-bit
WEP
mode, the key length is 5 characters or 10 hexadecimal digits. As for
128-bit
WEP mode, the key
length is 13 characters or 26 hexadecimal digits.
Current Network Key:
Select one set of the network key (from 1 to 4) as the default one.
PassPhrase:
You can enter ASCII codes into this field. The range is from 8 characters to 64
characters. For
ASCII characters
, you can key in
63
characters in this field. If you want to key in
64
characters, only
hexadecimal characters
can be used.
Generate WEP Keys:
Click this button to generate the PassPhrase.
Apply:
After proper configuration, click Apply to invoke the settings.
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 76
Chapter 2: WEB Configuration
Illustrations contained in this document are for representation only.
43
802.1x Authentication
If you enable the
802.1x authentication
function, you will have to offer the following information-
RADIUS Server:
RADIUS Server is a protocol for carrying authentication, authorization, and
configuration information between a Network Access Server which desires to authenticate its links
and a shared Authentication Server. Please key in the IP Address for the RADIUS Server.
RADIUS Port:
Besides the IP address of the RADIUS Server, you have to enter the port number for
the server. Port 1812 is the reserved RADIUS-authentication port described in RFC 2138. Earlier AP
(RADIUS clients) use port 1945. The default value will be shown on this box. You can keep and use
it.
RADIUS Key:
A RADIUS Key is like a password, which is used between IAS and the specific
RADIUS client to verify identity. Both IAS and the RADIUS client must be use the same RADIUS
Key for successful communication to occur. Enter the RADIUS Key.
Fig. 32
WPA/WPA2
For the WPA/WPA2 network Authentication, the settings that you can adjust including WPA/WPA2
Encryption, RADIUS Server, RADIUS Port, RADIUS Key, Group Key Rotation Interval, and
WPA/WPA2 Re-auth Interval.
WPA/WPA2 Encryption:
There are three types that you can choose,
TKIP*
,
AES**
,
TKIP+AES
.
TKIP takes the original master key only as a starting point and derives its encryption keys
mathematically from this mater key. Then it regularly changes and rotates the encryption keys
so that the same encryption key will never be used twice
** AES provides security between client workstations operating in ad hoc mode. It uses a
mathematical ciphering algorithm that employs variable key sizes of 128, 192 or 256 bits.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

124.8 / 5 based on 304 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top