Linksys WRV200 manual WPA2 Personal, WPA Enterprise, WPA2 Enterprise

Page 19

Chapter 5

Configuring the Wireless-G Router

Wireless Security - WPA Personal

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

WPA2 Personal

WPA2 gives you the encryption method AES. Enter a Shared Secret of 8-32 characters. Then enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.

Wireless Security - WPA2 Personal

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

WPA Enterprise

This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS

server’s IP address. Select TKIP or AES from the WPA Algorithms drop-down menu. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.

Wireless Security - WPA Enterprise

When you have finished making changes to the screen, click Save Settings to save the changes, or click Cancel Changes to undo your changes. For help information, click More.

WPA2 Enterprise

Wireless Security - WPA2 Enterprise

This option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) Enter the RADIUS server’s IP address. Enter the RADIUS server’s port number, along with the Shared Secret key, which is the key shared between the Router and the server. Last, enter the Key

Wireless-G VPN Router with RangeBooster

14

Image 19
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix I Regulatory Information Appendix E Gateway-to-Gateway VPN TunnelAppendix J Contact Information Introduction ChapterNetwork Layout Chapter Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyWhat is a VPN? Why do I need a VPN?Chapter Planning Your Virtual Private Network VPN VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterBack Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter Configuring the Wireless-G VPN RouterInternet Setup How to Access the Web-based UtilitySetup Setup Basic SettingsPptp LAN Setup Optional Settings Required by some ISPsSetup Ddns Setup VlanTime Settings Ddns Setup MAC Address CloneDynamic Routing Setup Advanced RoutingStatic Routing Wireless Network Mode WirelessWireless Basic Wireless Settings Wireless Wireless SecurityWPA Enterprise WPA2 PersonalWPA2 Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessWireless WDS Wireless Advanced Wireless SettingsAdvanced Wireless Settings Internet Block FirewallFirewall General Firewall Port ForwardingFirewall DMZ Firewall Port TriggeringVPN VPN Client Access Firewall Access RestrictionFirewall URL Filtering VPN Client List Table VPN VPN PassthroughCertificate Management Local Secure Group VPN IPSec VPNRemote Secure Group Key Management Remote Secure GatewayTunnel Options VPN VPN Summary Priority Queue QoSQoS Application-Based QoS QoS Port-Based QoSLocal Router Access AdministrationAdministration Management Admin PasswordBackup and Restore Administration LogUPnP Ping Test Administration DiagnosticsAdministration Factory Default Administration Firmware UpgradeInformation Administration RebootStatus Status RouterLocal Network Status WirelessStatus Local Network Status System PerformanceSystem Performance Status VPN ClientsVPN Summary Windows Appendix a TroubleshootingTroubleshooting Appendix aTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? General Network Security Guidelines Appendix B Wireless Security ChecklistWireless Security Checklist Appendix BOverview Before You Begin Installing from the CD-ROMAppendix C Appendix CVersion Number of the QuickVPN Client Using the Linksys QuickVPN SoftwareDistributing Certificates to QuickVPN Users Select VPN, then VPN Client Access\Program Files\Linksys\QuickVPN Client\ Create an IPSec Policy Appendix DIntroduction EnvironmentFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Create a Tunnel Through the Web-Based Utility Assign New IPSec PolicyYour tunnel should now be established Click IPSec VPN Configuration of the WRV200Appendix E Appendix E Gateway-to-Gateway VPN TunnelConfiguration of PC 1 and PC Configuration of the RV082Click the Gateway to Gateway tab RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Http HyperText Transport Protocol Appendix FAppendix F Glossary GlossarySmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Specifications Appendix G SpecificationsAppendix G Specifications Exclusions and Limitations Warranty InformationObtaining Warranty Service Appendix HTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb