Buffalo Technology WLM2-G54 manual Security Features, Authentication, Privacy

Models: WLM2-G54

1 36
Download 36 pages 13.09 Kb
Page 7
Image 7

5.0Features

The Buffalo AirStation Intelligent access point provides the features necessary in today’s business environment, with a high level of reliability and security. Use of these features along with VPN will allow the user to have the highest security a WLAN can offer. For minimum security measures Buffalo recommends the use of 128bit WEP and registering client MAC addresses in the AirStation. Some of the noteworthy features are shown below. Other features are listed in Section 9.

5.1Security Features

The WLM2-G54 model provides three levels of security: authentication, privacy and access authorization. The first level consists of checking and issuing the user’s authentication by EAP and 802.1x, similar to the Windows XP authentication process.

The second is encrypting user’s data with WEP, TKIP or MIC encryption algorithms. Finally, granting the data access privilege only after the user’s authentication is offered by exchanging a specific key under the 802.1x method.

5.1.1 Authentication

The IEEE802.1x security method imposes access port control at the access point level for each user communication signal. The EAP function in a client PC performs an authenti- cation login to the authorization server, such as RADIUS, through the WLM2-G54 access point when the link is established and before data transmission takes place.

EAP – Extensible Authentication Protocol is a function in a client PC, which initiates the authentication login to a network through an AP such as the WLM2-G54. When the client is approved and authenticated for a commu- nication session, the client receives a unique WEP key from a network security server such as RADIUS.

802.1x – Known as .1x, this is the key exchange standard used between a client and an AP for the user’s authentication process. Configuration for a large network is much easier since individual WEP settings are no longer required for each client. In addition, access management is performed easily in the RADIUS server environment, making this feature valuable for network administration.

5.1.2 Privacy

Several encryption algorithms can be used to mix with the data for protecting privacy. WEP is the encryption method adopted in the current WLAN industry. Because WEP was found to be vulnerable, WEP will be replaced with a more powerful Advanced Encryption System (AES) in the future so that even higher levels of security will be available. Meanwhile, use of TKIP and MIC can be an alternative to AES.

WEP – Wired Equivalent Privacy is a security method for wireless networking using the RC4 encryption algorithm. WEP consists of two elements: an Initialization Vector (IV) of 24 bits that describes the packet header information, and current data of 40 or 104 bits. For example, a 128bit WEP key means a 24bit IV plus a 104bit data encryption and they are encrypted separately.

2

Page 7
Image 7
Buffalo Technology WLM2-G54 manual Security Features, Authentication, Privacy

WLM2-G54 specifications

Buffalo Technology is known for its high-quality networking products, and one of their standout offerings is the WLM2-G54 wireless LAN router. This device caters to both home and small office users, prioritizing reliability and performance in wireless networking.

The Buffalo WLM2-G54 operates on the IEEE 802.11g standard, providing impressive wireless speeds of up to 54 Mbps. This makes it ideal for activities such as web browsing, streaming videos, and online gaming. Its backward compatibility with older 802.11b devices ensures that users can seamlessly connect their legacy equipment without needing extensive upgrades.

One of the most notable characteristics of the WLM2-G54 is its robust security features. It supports various encryption methods, including WEP, WPA, and WPA2, allowing users to establish secure connections and protect their sensitive data from unauthorized access. The inclusion of a built-in firewall adds another layer of defense, safeguarding the network from external threats.

In terms of physical design, the WLM2-G54 is compact and user-friendly. It can easily fit into small spaces, making it a convenient addition to any home or office setup. The router includes multiple LAN ports for wired connections, ensuring that users can connect additional devices such as desktops, gaming consoles, and printers with ease.

The WLM2-G54 also incorporates advanced technologies to enhance performance. One such feature is Buffalo's "Client Mode," which allows the router to connect to existing networks and extend coverage. This flexibility is beneficial for users who need to bridge long distances or eliminate dead zones in larger spaces.

Another significant characteristic of the WLM2-G54 is its easy setup process. The device typically features a user-friendly web interface, enabling users to configure their network settings without requiring extensive technical knowledge. Additionally, Buffalo often provides firmware updates to improve performance and security, ensuring that users always have access to the latest enhancements.

Overall, Buffalo Technology’s WLM2-G54 wireless LAN router is a versatile, reliable choice for those looking to establish or expand their wireless networking capabilities. With its combination of speed, security, and user-friendly features, it stands out as an excellent option for both home and small office environments. Its ability to integrate with existing network infrastructures further solidifies its place as a valuable asset in modern networking solutions.