Changing Wireless Security Settings - Enterasys RBTSA-AA User Manual

802.11a/b/g wireless ethernet adapter
Hide thumbs Also See for RBTSA-AA:
Table of Contents

Advertisement

35
C
3: C
HAPTER
ONFIGURING THE
Changing Wireless
Security Settings
E
A
THERNET
DAPTER
1 Connect the first Ethernet Adapter to power and use the Ethernet cable
to connect it to the computer.
2 Use the Enterasys Networks Wireless Infrastructure Device Manager to
select the Ethernet Adapter and launch the Configuration Management
System.
3 Under System Configuration, click Wireless Network.
4 In the Wireless Network page:
a Locate the Network Mode field and select Ad-hoc (Peer-to-Peer).
b Specify the Wireless LAN Service Area and the Channel Selection as
described in "Setting Wireless Network Properties" on page 33.
c Set the Data Preamble.
To increase performance, select Short (Enhanced performance). When
equipment that does not support short preamble is also being used,
select Long (Wi-Fi Interoperable). When you are finished, click Apply.
Security settings default to Open System (no security). Optionally, you can
set different WEP settings as described in "Changing Wireless Security
Settings" on page 36.
5 When you are finished, click Apply.
6 End the browser session.
7 Repeat steps 1–6 with the second Ethernet Adapter. Make sure you
configure Ethernet Adapter settings to match exactly. When you are
finished, click Apply and end the browser session.
8 Connect the Ethernet devices to the Ethernet Adapters. If you use hubs,
make sure that the Ethernet Adapters are connected through the hub
uplink ports.
Under System Configuration, click Wireless Security. The Wireless Security
Settings page appears, where you can select the type of security to be
used on the Ethernet Adapter.
The Ethernet Adapter can be configured to support three types of data
encryption: WEP, TKIP, and AES. After selecting a data encryption type,
you can select an authentication type.
The following sections describe the settings. To maintain wireless
association, the settings on clients and the access points they associate
with (or other members of an ad-hoc network) must match exactly.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rbtsa-abRoamabout rbtsa-aaRoamabout rbtsa-ab

Table of Contents