Linksys WAP200RF manual WPA-Personal aka WPA-PSK, WPA2-Personal

Page 26

Wireless-G Access Point with Power Over Ethernet and Rangebooster

Default Transmit Key. Select the key to be used for data encryption.

WEP Encryption. Select a level of WEP encryption, 64 bits (10 hex digits) or 128 bits (26 hex digits).

Passphrase. If you want to generate WEP keys using a Passphrase, then enter the Passphrase in the field provided and click the Generate key. Those auto-generated keys are not as strong as manual WEP keys.

Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit encryption or 26 characters in length for 128-bit encryption.

Change these settings as described here and click Save Settings to apply your changes, or click Cancel

Changes to cancel your changes. Help information is available on the right side of the screen.

WPA-Personal (aka WPA-PSK)

WPA Algorithm. WPA offers you two encryption methods, TKIP and AES for data encryption. Select the type of algorithm you want to use, TKIP or AES. The default is TKIP.

WPA Shared Key. Enter a WPA Shared Key of 8-63 characters.

Figure 6-6: Wireless - Wireless Security (WPA-Personal)

Key Renewal Timeout. Enter a Key Renewal Timeout period, which instructs the Access Point how often it should change the encryption keys. The default is 3600 seconds.

WPA2-Personal

WPA Algorithm. WPA2 always uses AES for data encryption.

WPA Shared Key. Enter a WPA Shared Key of 8-63 characters.

Key Renewal Timeout. Enter a Key Renewal Timeout period, which instructs the Access Point how often it should change the encryption keys. The default is 3600 seconds.

Figure 6-7: Wireless - Wireless Security (WPA2-Personal)

Chapter 6: Configuring the Wireless-G Access Point

20

The Wireless - Wireless Security Tab

Image 26
Contents User Guide How to Use this User Guide Copyright and TrademarksTable of Contents Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Example of a Simple Wireless Network List of Figures20 Security Monitor Basic Settings Introduction WelcomeWhat’s in this User Guide? Introduction What’s in this User Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout Example of a simple wireless network Getting to Know the Wireless-G Access Point LEDsAccess Point’s port are located on the back of the device PortsDesktop Placement and Antenna Setup Antennas and PositionsConnection Connecting the Wireless-G Access PointOverview Wall-Mount Option Placement OptionsStand Option Setting Up the Wireless-G Access Point Accessing the UtilityNavigating the Utility SetupWireless Security Monitor AP ModeAdministration Status Basic Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Network SetupSetup Time Tab TimeWireless Basic Wireless Settings Tab Basic SettingsWireless Wireless Security Tab Wireless SecurityWPA-Personal aka WPA-PSK WPA2-PersonalWPA2-Personal Mixed WPA-EnterpriseWPA2-Enterprise WPA2-Enterprise MixedDisable RadiusWireless Client List Wireless Wireless Connection Control TabWireless Connection Control Connection ControlWireless Advanced Wireless Settings Tab Advanced SettingsWireless Vlan & QoS Tab VlanQoS AP Mode Tab MAC Address18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Accounts Security Monitor Basic Settings TabWireless Security Monitor Security Monitor Event Log Tab Mail NotificationSyslog Notification Local AP Password Administration Management TabWeb Access ManagementSnmp IdentificationEmail Alert Administration Log TabLog Notification Queue LengthFactory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeReboot Administration Reboot TabAdministration Config Management Tab Config ManagementLocal Network Status Local Network TabInformation Status Wireless Tab Wireless NetworkStatus System Performance Tab WiredWireless System PerformancePage Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Page Appendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix F Specifications 802.11F Wireless Roaming11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM Dhcp Client11g 14 dBm SecurityCertification Wireless Security MonitorSuspicious network events Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Information section in this Guide Appendix I Contact InformationNeed to contact Linksys?