Page 141 / 428 Scroll up to view Page 136 - 140
Manually Configuring a WLAN
Chapter 7: Configuring a Wireless Network
127
In this field…
Do this…
Operation Mode
Select an operation mode:
802.11b (11Mbps
). Operates in the 2.4 GHz range and offers a
maximum theoretical rate of 11 Mbps. When using this mode,
only 802.11b stations will be able to connect.
802.11g (54 Mbps).
Operates in the 2.4 GHz range, and offers a
maximum theoretical rate of 54 Mbps. When using this mode,
only 802.11g stations will be able to connect.
802.11b/g (11/54 Mbps)
. Operates in the 2.4 GHz range, and offers
a maximum theoretical rate of 54 Mbps. When using this mode,
both 802.11b stations and 802.11g stations will be able to
connect.
802.11g Super (54/108 Mbps).
Operates in the 2.4 GHz range, and
offers a maximum theoretical rate of 108 Mbps. When using
this mode, 802.1g stations and 802.11g Super stations will be
able to connect.
802.11g Super (11/54/108)
. Operates in the 2.4 GHz range, and
offers a maximum theoretical rate of 108 Mbps. When using
this mode, 802.11b stations, 802.11g stations, and 802.11g
Super stations will all be able to connect.
Each operation mode indicates a wireless protocol (such as 802.11g
Super), followed by the maximum bandwidth (such as 108 Mbps).
The list of modes is dependent on the selected country.
You can prevent older wireless stations from slowing down your network,
by choosing an operation mode that restricts access to newer wireless
stations.
Note:
The actual data transfer speed is usually significantly lower than the
maximum theoretical bandwidth and degrades with distance.
Important:
The station wireless cards must support the selected operation
mode. For a list of cards supporting 802.11g Super, refer to
Page 142 / 428
Manually Configuring a WLAN
128
Check Point ZoneAlarm User Guide
In this field…
Do this…
Channel
Select the radio frequency to use for the wireless connection:
Automatic.
The ZoneAlarm router automatically selects a
channel. This is the default.
A specific channel.
The list of channels is dependent on the
selected country and operation mode.
Note:
If there is another wireless network in the vicinity, the two networks
may interfere with one another. To avoid this problem, the networks should
be assigned channels that are at least 25 MHz (5 channels) apart.
Alternatively, you can reduce the transmission power.
Security
Select the security protocol to use. For information on the supported
security protocols, see
Wireless Security Protocols
on page 114.
If you select
WEP encryption
, the
WEP Keys
area opens.
If you select
WPA-Personal
, the
Passphrase
,
Require WPA2 (802.11i)
, and
WPA
Encryption
fields appear.
Passphrase
Type the passphrase for accessing the network, or click
Random
to
randomly generate a passphrase.
This must be between 8 and 63 characters. It can contain spaces and
special characters, and is case-sensitive.
For the highest security, choose a long passphrase that is hard to guess,
or use the
Random
button.
Note:
The wireless stations must be configured with this passphrase as
well.
Page 143 / 428
Manually Configuring a WLAN
Chapter 7: Configuring a Wireless Network
129
In this field…
Do this…
Require WPA2
(802.11i)
Specify whether you want to require wireless stations to connect using
WPA2, by selecting one of the following:
Enabled.
Only wireless stations using WPA2 can access the
WLAN network.
Disabled.
Wireless stations using either WPA or WPA2 can
access the WLAN network. This is the default.
WPA Encryption
Select the encryption method to use for authenticating and encrypting
wireless data:
Auto.
The ZoneAlarm router automatically selects the cipher
used by the wireless client. This is the default.
AES.
Advanced Encryption Standard
TKIP.
Temporal Key Integrity Protocol
Note:
AES is more secure than TKIP; however, some devices do not
support AES.
WEP Keys
If you selected
WEP encryption
, you must configure at least one WEP key.
The wireless stations must be configured with the same key, as well.
Key 1, 2, 3, 4 radio
button
Click the radio button next to the WEP key that this gateway should use for
transmission.
The selected key must be entered in the same key slot (1-4) on the station
devices, but the key need not be selected as the transmit key on the
stations.
Note:
You can use all four keys to receive data.
Page 144 / 428
Manually Configuring a WLAN
130
Check Point ZoneAlarm User Guide
In this field…
Do this…
Key 1, 2, 3, 4
length
Select the WEP key length from the drop-down list.
The possible key lengths are:
64 Bits.
The key length is 10 characters.
128 Bits.
The key length is 26 characters.
152 Bits.
The key length is 32 characters.
Note:
Some wireless card vendors call these lengths 40/104/128,
respectively.
Note:
WEP is generally considered to be insecure, regardless of the
selected key length.
Key 1, 2, 3, 4 text
box
Type the WEP key, or click
Random
to randomly generate a key matching
the selected length. The key is composed of hexadecimal characters 0-9
and A-F, and is not case-sensitive.
Page 145 / 428
Manually Configuring a WLAN
Chapter 7: Configuring a Wireless Network
131
Table 23: Advanced Wireless Settings Fields
In this field…
Do this…
Advanced Security
Hide the Network
Name (SSID)
Specify whether you want to hide your network's SSID, by selecting one of
the following:
Yes.
Hide the SSID.
Only devices to which your SSID is known can connect to your
network.
No.
Do not hide the SSID.
Any device within range can detect your network name and
attempt to connect to your network. This is the default.
Note:
Hiding the SSID does not provide strong security, because by a
determined attacker can still discover your SSID. Therefore, it is not
recommended to rely on this setting alone for security.
MAC Address
Filtering
Specify whether you want to enable MAC address filtering, by selecting one
of the following:
Yes.
Enable MAC address filtering.
Only MAC addresses that you added as network objects can
connect to your network.
For information on network objects, see
Using Network
Objects
on page 95.
No.
Disable MAC address filtering. This is the default.
Note:
MAC address filtering does not provide strong security, since MAC
addresses can be spoofed by a determined attacker. Therefore, it is not
recommended to rely on this setting alone for security.
Station-to-Station
Traffic
Specify whether you want to allow wireless stations on this network to
communicate with each other, by selecting one of the following:
Allow.
Allow stations to communicate with each other. This is the
default.
Block.
Block traffic between wireless stations.

Rate

3.5 / 5 based on 2 votes.

Popular ZoneAlarm Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top