Chapter 6

Advanced Configuration

WPA2-Personal

Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge.

Wireless > Wireless Security - WPA2 Personal

Encryption  This is set to AES and cannot be changed as WPA2 always uses AES encryption.

Shared Secret  Enter a WPA Shared Secret of 8-63 characters.

Key Renewal Timeout  Enter a Key Renewal Timeout period, which instructs the Access Point how often to change the encryption keys. The default is 3600 seconds.

Click Apply to apply your changes, or click Cancel to cancel your changes.

WPA-Enterprise

Use the WPA Enterprise screen to configure WPA Enterprise encryption for the Bridge.

Wireless > Wireless Security - WPA Enterprise

WPA Enterprise provides WPA security in coordination with a RADIUS server connected to the Bridge. WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.

Authentication  Select the authentication method your network is using, either EAP-TLS(default) or PEAP.

EAP-TLS

EAP-TLS uses a Certificate file for authentication. The Login Name and Private Key Password are used to decrypt the certificate file.

Encryption  Select either TKIP (default) or AES encryption. Login Name  Enter your login name for the RADIUS server.

Private Key Password  Enter your password.

Certificate  Enter the name of your certificate file or click Browse to locate it. Click Import to load and decode the certificate file. Click Apply to save the configuration for wireless authentication while being associated with an Access Point.

PEAP

EAP-PEAP uses the Login Name and Password to perform authentication with the RADIUS server.

Encryption  Select either TKIP (default) or AES encryption. Login Name  Enter your login name for the RADIUS server.

Private Key Password  Enter your password.

When you are finished configuring the above settings, click Apply to apply your changes, or click Cancel to cancel your changes.

WPA2-Enterprise

Use the WPA2 Enterprise screen to configure WPA2 Enterprise encryption for the Bridge.

Wireless > Wireless Security - WPA2 Enterprise

WPA2 Enterprise provides WPA security in coordination with a RADIUS server connected to the Bridge. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only one encryption method, AES.

Authentication  Select the authentication method your network is using, either EAP-TLS(default) or PEAP.

Wireless-G Business Ethernet Bridge

12

Page 16
Image 16
Linksys WET200 manual WPA2-Personal, WPA-Enterprise, WPA2-Enterprise

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.