Prestige 2602H/HW Series User’s Guide

Use the Local User Database if you have less than 32 wireless clients in your network. The Prestige uses MD5 encryption when a client authenticates with the Local User Database

5.2.3Restricted Access

The MAC Filter screen allows you to configure the AP to give exclusive access to devices (Allow Association) or exclude them from accessing the AP (Deny Association).

5.2.4 Hide Prestige Identity

If you hide the ESSID, then the Prestige cannot be seen when a wireless client scans for local APs. The trade-off for the extra security of “hiding” the Prestige may be inconvenience for some valid WLAN clients. If you don’t hide the ESSID, at least you should change the default one.

5.2.5Configuring Wireless LAN on the Prestige

1Configure the ESSID and WEP in the Wireless screen. If you configure WEP, you can’t configure WPA or WPA-PSK.

2Use the MAC Filter screen to restrict access to your wireless network by MAC address.

3Configure WPA or WPA-PSKin the 802.1x/WPA screen.

You can also configure 802.1x wireless client authentication in the 802.1x/WPA screen.

4Configure the RADIUS authentication database settings in the RADIUS screen.

5Configure the built-in authentication database in the Local User Database screen.

The following figure shows the relative effectiveness of these wireless security methods available on your Prestige.

92

Chapter 5 Wireless LAN (P2602HW Models)