
ProSafe Premium 3 x 3
Table 36. Point-to-point bridge profile and authentication settings (continued)
Setting | Description |
|
|
|
|
Network | Open System | Although you can use the bridge communication without any |
Authentication and |
| authentication and encryption, NETGEAR recommends that |
Data Encryption |
| you use WEP if you do select an open system. From the Data |
(continued) |
| Encryption |
|
| • None. No authentication and encryption. |
|
| • |
|
| encryption. |
|
| • |
|
| |
|
| • |
|
| 128+24 bit encryption. This mode functions only with |
|
| other wireless stations that support this mode. |
|
|
|
|
| TKIP (Temporal Key Integrity Protocol) is the standard |
|
| encryption method used with |
|
| selection possible from the Data Encryption |
|
| In the WPA Passphrase (Network Key) field, enter a |
|
| passphrase. The passphrase length needs to be between |
|
| 8 and 63 characters (inclusive). |
|
| AES (Advanced Encryption Standard) is the standard |
|
| encryption method used with |
|
| selection possible from the Data Encryption |
|
| In the WPA Passphrase (Network Key) field, enter a |
|
| passphrase. The passphrase length needs to be between |
|
| 8 and 63 characters (inclusive). |
|
| Note: NETGEAR recommends |
|
| with AES encryption if you want to use the 11n rates and |
|
| speed. |
|
|
|
h.Click Apply to save your security profile settings. The Bridging screen displays again.
i.If the correct profile name and security option are displayed in the table, select the check box in the Enable column.
j.Click Apply on the Bridging screen to save your
2.Configure a second wireless access point (AP2) on LAN Segment 2 (see Figure 67 on page 119) in
AP1 needs to have AP2’s MAC address in its Remote MAC Address field, and AP2 needs to have AP1’s MAC address in its Remote MAC Address field.
3.Verify the following settings for both wireless access points:
• Both wireless access points are configured to operate in the same LAN network address range as the LAN devices.
• Both wireless access points use the same channel, authentication mode, and security settings.
4.Verify connectivity across the LAN 1 and LAN 2.