Motorola WU830G manual Configuring Security Settings

Page 28

CONFIGURATION

SECTION 3

 

 

Configuring Security Settings

There are a series of security windows that enable you to configure the security type for your wireless connection. To access these windows, use one of the following methods:

!By clicking Set Security on the Profiles tab

!When connecting to an access point from the Site Monitor tab and a password or other information is required to connect to that access point, the system automatically displays the correct security window

The WU830G displays windows for you to enter information based on the type of security used by the access point. For example, if you try to connect to an access point with WPA security enabled, the WU830G displays a security window for WPA authentication.

To successfully connect to the wireless network, the WU830G must match the security settings used by the access point.

To establish the security settings you must first choose the authentication option that establishes either an open or secure verification of communication with an access point. The four authentication options are Open, Shared, WPA-PSK and WPA.

After you choose the authentication option, you then choose the data encryption setting.

The following table lists the network authentication options and the data encryption options available for each type of authentication:

Network Authentication

Data Encryption

 

 

 

 

Option

Description

Option

Description

 

 

 

 

Open

With open authentication there is no

Disabled

No

 

data encryption.

 

encryption is

 

 

 

used.

 

 

 

 

Shared

The network operates in Shared

WEP 64-bit

A network

 

Key authentication mode when a

or

key is used.

 

network key is used for data

WEP 128-bit

 

 

encryption. WEP is the type of

 

 

 

encryption used. The Shared Key

 

 

 

authentication mode is the least

 

 

 

secure.

 

 

 

 

 

 

WU830G

3-11

Image 28
Contents User Guide WU830G Wireless USB Adapter FCC Compliance Class B Digital Device Canada Industry Canada IC Contents Contents Overview Features OverviewOverview Section Box ContentsUnderstanding Your User Guide Simple Home Network Diagram Wireless Connections USB Adapter Physical Description Feature DescriptionFront of USB Adapter Back of USB Adapter Following illustration shows the back of the WU830GBefore You Begin Enterprise Business UsersSmall Office/Home Office Users InstallationSecurity Options Installation Section Network Authentication Data Encryption Option DescriptionSecurity Example Installing Your USB Adapter Device Configuration SetupConfiguration Configuration Understanding the Antenna IconsConfiguration Section Link Status Information Field or Button DescriptionAP MAC Connecting to an Available Wireless Network Column Description Heading Creating a Network Profile Ssid Configuration Configuring Security Settings Setting Security for a Wireless Network or a Profile Select the Authentication Select the Encryption StatusOpen Authentication Encryption Description StatusShared Authentication Encryption Status WPA-PSK Authentication Field DescriptionWPA Authentication Configuration Chap PAPMS Chap Protocols are MD5 Challenge Name and Password for userEAP-GTC Removing a Network from the Profile List Viewing Product Information Removing the Wireless USB Adapter Configuration Hardware Solutions Contact Us Register the WU830GTroubleshooting Start button to ProgramsAccessoriesCommand PromptTroubleshooting Section Ascii BSS GlossaryCPE Glossary Section DhcpDMZ DNSDsss EAP-LEAPEAP-PEAP EAP-TLSFTP ESSGUI Hexadecimal HostIcmp IeeeIsdn ISPLAN LeapNAT MTUNIC Pcmcia PingPPP PptpROM RadiusRTS Smtp TCP TCP/IPUDP USBVPN WANWAP WEPWPA WlanWWW Mgbi