SMC Networks SMC EliteConnect SMC2586W-G User Manual page 45

2.4ghz 802.11g wireless bridge user manual
Hide thumbs Also See for SMC EliteConnect SMC2586W-G:
Table of Contents

Advertisement

As illustrated in Fig. 46 when AP 1 and AP 2 are using the "This AP Only"
option, AP1 blocks wireless traffic between STA 1 and STA 2, while wireless
traffic between STA 2 and STA 3, which are associated with different APs, is
still allowed. If the "All APs in This Subnet" option is used as shown in Fig. 47,
AP 1 and AP 2 communicates with each other via an inter-AP protocol to
share their STA association information to block wireless traffic among all
the STAs.
There are up to 7 security modes:
• Open System. No authentication, no data encryption.
• Static WEP. WEP (Wired Equivalent Privacy) keys must be manually configured.
• Static TKIP (WPA-PSK). Only TKIP (Temporal Key Integrity Protocol)
mechanism of WPA (Wi-Fi Protected Access) is enabled. In this mode, you
have to specify the Pre-shared key, which will be used by the TKIP engine
as a master key to generate keys that actually encrypt outgoing packets
and decrypt incoming packets.
NOTE: The number of characters of the Pre-shared key setting must be at
least between 8 and can be up to 63.
• IEEE 802.1x EAP without Encryption (EAP-MD5). The IEEE 802.1x
functionality is enabled and the user-name/password-based EAP-MD5
authentication is used. No data encryption.
• IEEE 802.1x EAP with Static WEP (EAP-MD5). The IEEE 802.1x
functionality is enabled and the user-name/password-based EAP-MD5
authentication is used. Data encryption is achieved by static WEP.
• IEEE 802.1x EAP with Dynamic WEP (EAP-TLS, EAP-TTLS, PEAP). The
IEEE 802.1x functionality is enabled and dynamic WEP key distribution
authentication (EAP-TLS, EAP-TTLS, or PEAP) is used. Data encryption is
achieved by dynamic WEP.
• IEEE 802.1x EAP with Dynamic TKIP (WPA). This is a full WPA mode, in
which both the TKIP and IEEE 802.1x dynamic key exchange mechanisms
are enabled. The SMC2586W-G is highly secured in this mode.
In the above security modes, a back-end RADIUS (Remote Authentication
Dial-In User Service) server is needed if IEEE 802.1x functionality is enabled.
See Section 3.5.3 for more information about IEEE 802.1x and RADIUS.
According to the IEEE 802.11 standard, WEP can be used for authentication
and data encryption. Normally, Shared Key authentication is used if WEP
data encryption is enabled. In rare cases, Open System authentication may
be used when WEP data encryption is enabled. The Authentication algorithm
setting is provided for better compatibility with wireless client computers
44

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

2586w-g - annexe 1

Table of Contents