SMC Networks SMCWBR14-N2 manual Wep, Example, WPA-Personal and WPA-Enterprise

Page 20

WEP

A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network.

Example:

64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 characters for 64-bit encryption.)

128-bit hexadecimal keys are exactly 26 characters in length. (456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit encryption.)

64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption.)

128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for 128-bit encryption.)

Note that, if you enter fewer characters in the WEP key than required, the remainder of the key is automatically padded with zeros.

WPA-Personal and WPA-Enterprise

Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the router should employ.

WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard. With the "WPA or WPA2" option, the router tries WPA2 first, but falls back to WPA if the client only supports WPA. The strongest cipher that the client supports will be used. With the "WPA2 Only" option, the router associates only with clients that also support WPA2 security. If the clients support the AES cipher, it will be used across the wireless network to ensure best security.

Group Key Update Interval: The amount of time before the group key used for broadcast and multicast data is changed.

WPA-Personal

This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).

Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII (American Standard Code for Information Interchange) format at both ends of the wireless connection. It cannot be shorter than eight characters, although for proper security it needs to be of ample length and should not be a commonly known phrase. This phrase is used to generate session keys that are unique for each wireless client.

Example:

17

Image 20
Contents User Guide Limited Warranty Page CE Mark Declaration of Conformance for EMI and Safety EEC Important NoteFCC Radiation Exposure Statement IiiTable of Contents SMCWBR14-N2 Package Contents Wireless LAN Networking AD-HOCIBSS NetworkChannel for each station Page Roaming in an ESS network diagram Introduction Hardware Overview Front Panel LED’s Getting Started Using the Configuration Menu ¾ Click LogBasic BasicInternetBasicWireless Enable Wireless Wireless Network NameEnable Auto Channel Scan Wireless ChannelWEP ExampleWPA-Personal and WPA-Enterprise WPA-PersonalAdvanced Optional Backup Radius Server BasicNetwork Settings Router Settings Enable RIPRIP Operating mode IP AddressAct as default router Allow RIP updates from WANRIP Password Dhcp Server SettingsDhcp Lease Time Always BroadcastAdd/Edit Dhcp Reservation Computer NameDhcp Reservations List Number of Dynamic Dhcp ClientsRevoke ReserveAdvanced AdvancedVirtual ServerVirtual Server Parameters Name ProtocolPrivate Port Public PortEnable ScheduleAdd/Edit Virtual Server SaveApplication AdvancedSpecial ApplicationsParameters for an Application Rule Example Trigger Port Range Trigger ProtocolInput Port Range Input ProtocolAdvancedGaming Port Forwarding Fields Name TCP Ports To OpenUDP Ports To Open Edit/Add Game RuleStreamEngine Setup Enable StreamEngine AdvancedStreamEngineAutomatic Classification Dynamic FragmentationAutomatic Uplink Speed Measured Uplink SpeedAdd/Edit StreamEngine Rule Enable PrioritySource IP Range Source Port RangeAdvancedRouting Add/Edit RouteRoutes List Add Policy AdvancedAccess ControlPolicy Wizard Policy Table Add/Edit Web Site AdvancedWEB FilterWeb Filter Parameters Web Site Allowed Web Site List Enable MAC Address Filter Filter Settings ModeFilter Wireless Clients AdvancedMAC Address FilterMAC Address List Filter Wired ClientsAdd/Edit MAC Address AdvancedFirewall Firewall Settings Enable SPI NAT Endpoint FilteringEndpoint Independent Address RestrictedDMZ IP Address Enable DMZDMZ Host Pptp RtspFTP NetmeetingSIP Wake-On-LANAdvancedInbound Filter Add/Edit Inbound Filter Rule ActionInbound Filter Rules List Allow AllAdvancedAdvanced Wireless 802.11d Enable WMM EnableExtra Wireless Protection WDS EnableEnable UPnP Enable WAN Ping RespondAdvancedNetwork UPnPEnable Multicast Streams AdvancedWISHWAN Port Speed Multicast StreamsWish HttpSave/Update Host 1 IP RangeHost 1 Port Range Host 2 IP RangeAdvancedWi-Fi Protected Setup Wi-Fi Protected Setup EnableLock Wireless Security Settings PIN SettingsReset PIN to Default Add Wireless Device WizardCurrent PIN Generate New PINToolsAdmin ToolsAdmin Password User PasswordEnable Remote Management Remote Admin PortTime Configuration Current Router Time Enable Daylight SavingToolsTime Time ZoneAutomatic Time Configuration Enable NTP Server Daylight Saving OffsetDST Start and DST End NTP Server UsedSyslog Server IP Address Enable Logging to Syslog ServerToolsSyslog ToolsEmail Settings On Schedule Verify PasswordEmail Log When Full or on Schedule On Log Full Save Settings To Local Hard Drive Load Settings From Local Hard DriveRestore To Factory Default Settings Reboot The DeviceFirmware Upgrade ToolsFirmwareFirmware Information Check OnlineUpload ToolsDynamic DNS Timeout ToolsSystem Check ToolsSchedules Schedule Rules List StatusDevice info Statistics and Active SessionsDhcp Connection PPPoE, PPTP, L2TP ConnectionBigPond Connection LAN ComputersRate StatusWirelessSignal StatusRouting Apply Log Settings Now StatusLogsWhat to View View LevelsSave Log RefreshEmail Now StatusStatistics StatusActive Sessions InternalExternal NATStatusWISH Sessions DirOut Time OutOriginator TargetEstablished or closing TCP connections Adsl AsciiBootp CAT Dhcp DMZEAP DNSDSL GUI Https IcmpIeee IgmpIPX ISPLAN LEDLPR/LPD L2TPMdix MIBMppe MTUNIC NTPOfdm OSIRIP PPPRadius RSA SmtpSnmp SohoSsid TCPTCP/IP TftpURL USBUTP VlanWDS WispWlan WPAYagi antenna 802.11Technical Support