X-Micro Tech XWL-11GRTX user manual What is Preamble Type?, What is Ssid Broadcast?, What is WPA2?

Page 66

buffered frames at the access point).

4.13What is Preamble Type?

There are two preamble types defined in IEEE 802.11 specification. A long preamble basically gives the decoder more time to process the preamble. All

802.11devices support a long preamble. The short preamble is designed to improve efficiency (for example, for VoIP systems). The difference between the two is in the Synchronization field. The long preamble is 128 bits, and the short is 56 bits.

4.14What is SSID Broadcast?

Broadcast of SSID is done in access points by the beacon. This announces your access point (including various bits of information about it) to the wireless world around it. By disabling that feature, the SSID configured in the client must match the SSID of the access point.

Some wireless devices don't work properly if SSID isn't broadcast (for example the D-link DWL-120 USB 802.11b adapter). Generally if your client hardware supports operation with SSID disabled, it's not a bad idea to run that way to enhance network security. However it's no replacement for WEP, MAC filtering or other protections.

4.15What is Wi-Fi Protected Access (WPA)?

Wi-Fi’s original security mechanism, Wired Equivalent Privacy (WEP), has been viewed as insufficient for securing confidential business communications. A longer-term solution, the IEEE 802.11i standard, is under development. However, since the IEEE 802.11i standard is not expected to be published until the end of 2003, several members of the WI-Fi Alliance teamed up with members of the IEEE 802.11i task group to develop a significant near-term enhancement to Wi-Fi security. Together, this team developed Wi-Fi Protected Access.

To upgrade a WLAN network to support WPA, Access Points will require a WPA software upgrade. Clients will require a software upgrade for the network interface card, and possibly a software update for the operating system. For enterprise networks, an authentication server, typically one that supports RADIUS and the selected EAP authentication protocol, will be added to the network.

4.16What is WPA2?

It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i

57

Image 66
Contents Wlan 11g Broadband Router MAX. OUT Power Federal Communications Commission FCC Statement Copyright DisclaimerTable of Contents Frequently Asked Questions FAQ What is WMM? What is Wlan ACK TIMOUT? Terminology VPN 1Package contents 2Product SpecificationsProduct Features Generic RouterPanel Description Wlan LEDWAN 1Hardware Installation 2Software InstallationFor OS of Microsoft Windows 95/ 98/ Me For OS of Microsoft Windows 2000, XPConnect to the X-Micro Wlan 11g Broadband Router For OS of Microsoft Windows NTItemDescription Bssid Setup Wizard Operation ModeII Time Zone Setting III LAN Interface SetupIV WAN Interface Setup Wireless Basic SettingsVI Wireless Security Setup DescriptionWireless Basic Settings Wireless Advanced Settings MAC address. Client Mode onlySystem, Shared Key or Auto selection Wireless Security Setup Wlan IC of RealtekCharacters. WPA, PersonalPre-Shared Key OnlyWEP Key Setup Wireless Access Control Click the Disabled , Allow Listed or Deny ListedWDS Settings WEP64bits, WEP128bits, Wpatkip WDS Security SetupII WDS AP Table WPA2AES or NoneSite Survey LAN Interface Setup WAN Interface Setup Information. Server mode onlyClick to open the Active Dhcp Client Table window Static IP II Dhcp Client Server III PPPoE There are Continuous , Connect on DemandIf you select the PPPoE and Connect on Demand IV Pptp Firewall Port Filtering Firewall IP Filtering Firewall MAC Filtering Firewall Port Forwarding Screen snapshot Firewall Port Forwarding Firewall URL Filtering Firewall DMZVPN Setting Enable DMZ Click to enable the DMZ functionScreen snapshot VPN Setup VPN Setup Edit Tunnel Mode only II Advanced IKE Setup Click to select DH1modp768 , DH2modp1024 orManagement Statistics Sent PacketsReceived Packets Management Time Zone Setting Management DdnsManagement Denial-of-Service Management Log Management Upgrade Firmware Management Save/ Reload Settings Management Password Setup Management WatchDogManagement Quality of Service Screen snapshot Management Qaulity of Service Removed from the Current Bandwidth Control LogoutBandwidth Control Table Addresses Current Bandwidth Control Table4How does wireless networking work? 1What and how to find my PC’s IP and MAC address?2What is Wireless LAN? 3What are ISM bands?5What is BSSID? 6What is ESSID?8What are the Open System and Shared Key authentications? 9What is WEP?What is Fragment Threshold? What is RTS Request To Send Threshold? What is Beacon Interval?What is Wi-Fi Protected Access WPA? What is Preamble Type?What is Ssid Broadcast? What is WPA2?What is Advanced Encryption Standard AES? What is 802.1x Authentication?What is Temporal Key Integrity Protocol TKIP? What is Inter-Access Point Protocol IAPP?What is DDNS? What is Maximum Transmission Unit MTU Size?What is Clone MAC Address? What is NTP Client?What is Wlan ACK TIMOUT? Example One PPPoE on the WAN Configure the WAN interface Configure the LAN interface192.168.2.254 Configure the Wlan interfaceExample Two Fixed IP on the WAN 192.168.2.10Configuration Example Two Fixed IP on the WAN Configure the WAN interface Configure the Wlan interface