Linksys WAP200RF manual

Page 55

Wireless-G Access Point with Power Over Ethernet and Rangebooster

WPA Personal. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-63 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the AP or other device how often it should change the encryption keys.

WPA Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the AP or other device.) First, select the type of WPA algorithm, TKIP or AES. Enter the RADIUS server’s IP Address and port number, along with a key shared between the device and the server.

Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys.

WPA2. Wi-Fi Protected Access 2 (WPA2) is the latest security standard in Wi-Fi security. Two modes are available:

Personal and Enterprise. WPA2 always uses AES (Advanced Encryption System) for stronger data encryption.

WPA2 Personal. If you do not have a RADIUS server, enter a password in the Pre-Shared key field of 8-63 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the AP or other device how often it should change the encryption keys.

WPA2 Enterprise. WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the AP or other device.) First, enter the RADIUS server’s IP Address and port number, along with a key shared between the device and the server. Then, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys.

WPA2 Mixed. WPA2 Mixed modes provide users an upgrade path from WPA to WPA2. You can have client devices running both WPA and WPA2 and the Access Point will automatically select the security method used by the client.

Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting sensitive data over your network, encryption should be used.

These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer.

Appendix B: Wireless Security

49

Security Threats Facing Wireless Networks

Image 55
Contents User Guide Copyright and Trademarks How to Use this User GuideTable of Contents Appendix B Wireless Security Appendix a TroubleshootingFrequently Asked Questions List of Figures Example of a Simple Wireless Network20 Security Monitor Basic Settings Welcome IntroductionWhat’s in this User Guide? Introduction What’s in this User Guide? Network Topology Planning Your Wireless NetworkRoaming Network Layout Example of a simple wireless network LEDs Getting to Know the Wireless-G Access PointPorts Access Point’s port are located on the back of the deviceAntennas and Positions Desktop Placement and Antenna SetupOverview Connecting the Wireless-G Access PointConnection Stand Option Placement OptionsWall-Mount Option Accessing the Utility Setting Up the Wireless-G Access PointWireless SetupNavigating the Utility Administration AP ModeSecurity Monitor Status Network Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Basic SetupTime Setup Time TabBasic Settings Wireless Basic Wireless Settings TabWireless Security Wireless Wireless Security TabWPA2-Personal WPA-Personal aka WPA-PSKWPA-Enterprise WPA2-Personal MixedWPA2-Enterprise Mixed WPA2-EnterpriseRadius DisableConnection Control Wireless Wireless Connection Control TabWireless Connection Control Wireless Client ListAdvanced Settings Wireless Advanced Wireless Settings TabVlan Wireless Vlan & QoS TabQoS MAC Address AP Mode Tab18 Wireless Repeater Mode 19 Wireless Bridge Mode Wireless Security Monitor Security Monitor Basic Settings TabSecurity Monitor Accounts Mail Notification Security Monitor Event Log TabSyslog Notification Management Administration Management TabWeb Access Local AP PasswordIdentification SnmpNotification Queue Length Administration Log TabLog Email AlertFirmware Upgrade Administration Factory Default TabAdministration Firmware Upgrade Tab Factory DefaultConfig Management Administration Reboot TabAdministration Config Management Tab RebootInformation Status Local Network TabLocal Network Wireless Network Status Wireless TabSystem Performance WiredWireless Status System Performance TabPage Frequently Asked Questions Appendix a TroubleshootingWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Page Appendix C Upgrading Firmware Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary 802.11F Wireless Roaming Appendix F SpecificationsSecurity Dhcp Client11g 14 dBm 11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBMSuspicious network events Wireless Security MonitorCertification Limited Warranty Appendix G Warranty InformationAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Need to contact Linksys? Appendix I Contact InformationInformation section in this Guide