Buffalo Technology WLM2-G54 manual Access Authorization, Ibss Security, Integrity Features

Page 8

TKIP – Temporal Key Integrity Protocol is an advanced encryption method using the RC4 algorithm. Instead of using the sequential IV, a random IV will be used, and the IV key definition will be updated regularly at a preset time interval.

MIC – Message Integrity Check is an encryption method used to prevent a hacker from changing the data content. An encryption algorithm and bit checksum at both the sender and receiver ends are used to check for alteration of the packet content.

5.1.3 Access Authorization

When the client is approved and authenti- cated for a communication session, the client receives a unique WEP key from the security server, such as a RADIUS server, under the 802.1x/EAP authorization specification. A new WEP key is issued for each connection, thus improving security, and the WEP key is updated regularly at a preset time interval. Another method to screen out unauthorized users is MAC address filtering.

ESS-ID– Extended Service Set Identification is a type of unique identifier applied to both the AP and the wireless client, as well as each information packet. It allows APs to recognize each wireless client and its traffic. This option, however, does not provide sufficient security for today’s wireless networking environment. If the ESS-ID is set to "any" or "null", anybody can connect to the AP. Also, Windows XP automatically displays the ESS-ID of the AP when a client receives a "beacon." This is because APs transmit their ESS-ID periodically and these transmissions can be easily intercepted.

MAC Address – Media Access Control address is a hardware address that uniquely identifies network hardware such as a wireless NIC or an AP. It is easy to access a network with a stolen wireless NIC. Although it is used as the top level filtering, it is not secure enough, because MAC addresses can be duplicated by non- registered users.

5.1.4 IBSS Security

IBSS – Independent Basic Service Set security is used for ad hoc communications like the point-to-point protocol (PPP) method. WEP and MAC address filtering can be used at this point.

5.2Integrity Features

5.2.1 Improved Fault Tolerance

A company’s Intranet is an important corporate communication backbone, so the WLM2-G54 AP offers features for network stability, which is achieved through the system’s redundant switching function, activated automatically in the event of faults. The auto system redundancy provides the network reliability necessary for mission critical applications.

5.2.2 Link Integrity

When multiple access points use the same frequency for roaming, they tend to interfere with each other. The WLM2-G54 AP automatically switches all PCs under the same wireless ESS-ID to another available access point if the current access point becomes disconnected form the network, thus preserving the connection and throughput.

3

Image 8
Contents WLM2-G54 Page Part 10.1 Signs IiiSummary of Features Package ContentsIntroduction System RequirementsFeatures Security FeaturesAuthentication PrivacyAccess Authorization Integrity FeaturesImproved Fault Tolerance Ibss SecurityNetwork Load Distribution Features Network Administration Fea TuresEasy Support Features Network SolutionsTypical Office Situations Apartments or CondominiumsFactories SchoolsHospitals Support Functions PoE Power over EthernetArea Intranets Upgradeable Firmware Diagnostic SupportClient Configuration Introduction Setup PreparationAfter finding an AirStation, select Admin / Set IP address Setup ScreenInput Parameters Through a Wired PC,Terminal Software Input Parameters Through the Client ManagerInput Parameters Through a Wired PC,Telnet Software Select Start / RunDetailed Configurations Introduction Basic SettingsTime Settings ManagementSystem1=General administrative information BridgeRouting See next Manual Setting Basic FilterBasic Filter Information Server Name=The name of the Radius server or the IP addressList of the Wireless PCs Authorized Wireless LAN PCsWireless Add Peer AirStation MAC Address10 Wireless 11 Link Integrity SettingsConfigure EAP in the Security/802.11g screen Privacy, WEP Link Integrity SettingsDigits of hexadecimal numbers, i.e. a3d58b62fe PS Privacy SeparatorWireless Distribution System Settings Diagnostics IntroductionParameters for the Diagnostic Operation Add AirStation Connected AirStationSee previous Wireless LAN PC Information 3 Wireless LAN PC Information5 Ping Test Additional Information Appendix aAppendix a Intelligent Access Point WLM2-G54 Specifications Appendix B Troubleshooting Other ProblemsLED Activity Table B.1 Diag LED Activity TableCRC Cyclic Redundancy Check DCE Data Communications EquipDsss Direct Sequence Spread DTE Data Terminal Equipment DeviceRadius Remote Authentication Dial RAM Random Access Memory NonMips Millions of Instructions Per PCI Peripheral Component InterconWlan Wireless LAN a LAN topology ROM Read Only Memory PermanentSmtp Simple Mail Transfer Protocol Snmp Simple Network ManagementPage Page Buffalo Technology Technical Support

WLM2-G54 specifications

Buffalo Technology is known for its high-quality networking products, and one of their standout offerings is the WLM2-G54 wireless LAN router. This device caters to both home and small office users, prioritizing reliability and performance in wireless networking.

The Buffalo WLM2-G54 operates on the IEEE 802.11g standard, providing impressive wireless speeds of up to 54 Mbps. This makes it ideal for activities such as web browsing, streaming videos, and online gaming. Its backward compatibility with older 802.11b devices ensures that users can seamlessly connect their legacy equipment without needing extensive upgrades.

One of the most notable characteristics of the WLM2-G54 is its robust security features. It supports various encryption methods, including WEP, WPA, and WPA2, allowing users to establish secure connections and protect their sensitive data from unauthorized access. The inclusion of a built-in firewall adds another layer of defense, safeguarding the network from external threats.

In terms of physical design, the WLM2-G54 is compact and user-friendly. It can easily fit into small spaces, making it a convenient addition to any home or office setup. The router includes multiple LAN ports for wired connections, ensuring that users can connect additional devices such as desktops, gaming consoles, and printers with ease.

The WLM2-G54 also incorporates advanced technologies to enhance performance. One such feature is Buffalo's "Client Mode," which allows the router to connect to existing networks and extend coverage. This flexibility is beneficial for users who need to bridge long distances or eliminate dead zones in larger spaces.

Another significant characteristic of the WLM2-G54 is its easy setup process. The device typically features a user-friendly web interface, enabling users to configure their network settings without requiring extensive technical knowledge. Additionally, Buffalo often provides firmware updates to improve performance and security, ensuring that users always have access to the latest enhancements.

Overall, Buffalo Technology’s WLM2-G54 wireless LAN router is a versatile, reliable choice for those looking to establish or expand their wireless networking capabilities. With its combination of speed, security, and user-friendly features, it stands out as an excellent option for both home and small office environments. Its ability to integrate with existing network infrastructures further solidifies its place as a valuable asset in modern networking solutions.