P-660H/HW/W-T Series User’ Guide

Table 14 MAC Filter (continued)

LABEL

DESCRIPTION

 

 

MAC Address

Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal

 

character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are

 

allowed or denied access to the Prestige in these address fields.

Back

Click Back to go to the main wireless LAN setup screen.

 

 

Apply

Click Apply to save your changes back to the Prestige.

 

 

Cancel

Click Cancel to begin configuring this screen afresh.

 

 

5.6 Introduction to WPA

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA is preferred to WEP as WPA has user authentication and improved data encryption. See the appendix for more information on WPA user authentication and WPA encryption.

If you don’t have an external RADIUS server, you should use WPA-PSK (WPA -Pre-Shared Key). WPA-PSK only requires a single (identical) password entered into each WLAN member. As long as the passwords match, a client will be granted access to a WLAN.

Note: You can’t use the Local User Database for authentication when you select WPA.

5.6.1 WPA-PSK Application Example

A WPA-PSK application looks as follows.

1First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must be between 8 and 63 printable characters (including spaces; alphabetic characters are case-sensitive).

2The AP checks each client’s password and (only) allows it to join the network if the passwords match.

3The AP derives and distributes keys to the wireless clients.

4The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.

77

Chapter 5 Wireless LAN