SMC Networks EZ Connect SMCWEB-N User Manual page 45

N draft 11n wireless access point/ethernet client
Hide thumbs Also See for EZ Connect SMCWEB-N:
Table of Contents

Advertisement

64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit
encryption.)
128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for
128-bit encryption.)
Note that, if you enter fewer characters in the WEP key than required, the remainder of the key is
automatically padded with zeros.
WPA-Personal and WPA-Enterprise
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by
the Wi-Fi Alliance. The WPA Mode further refines the variant that the bridge should employ.
WPA Mode: WPA is the older standard; select this option if the Access Point that will be used with the bridge
only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security
standard. With the WPA2 option, the bridge tries WPA2 first, but falls back to WPA if the client only supports
WPA. With the WPA2 Only option, the bridge associates only with clients that also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity
Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is
a very secure block based encryption. With the TKIP or AES option, the bridge negotiates the cipher type with
the access point, and uses AES when available.
Group Key Update Interval: The amount of time before the group key used for broadcast and multicast data
is changed.
WPA-Personal
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK). The WPA Mode further refines the
variant that the bridge should employ.This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII
(American Standard Code for Information Interchange) format at both ends of the wireless connection. It
cannot be shorter than eight characters, although for proper security it needs to be of ample length and should
not be a commonly known phrase. This phrase is used to generate session keys that are unique for each
wireless client.
Example:
Wireless Networking technology enables ubiquitous communication
WPA-Enterprise
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have
established the necessary credentials before attempting to authenticate to the Server through this bridge.
EAP Type: The EAP type which is used for the authentication. These types are EAP-TLS, EAP-TTLS and
PEAP.
Inner Authentication Method for TTLS: If the authentication type is selected as EAP-TTLS, it uses an inner
authentication method after the TLS-securedtunnel is established between the client and server. The
supported inner authentication types for EAP-TTLS are PAP, CHAP and MS-CHAPv2.
Inner Authentication Method for PEAP: If the authentication type is selected as PEAP, it uses an inner
authentication method after the TLS-secured tunnel is established between the client and server. The
supported inner authentication type for PEAP is MS-CHAPv2.
EAP Username: The username of the wireless client for the tunnel establishment and the inner authentication
method.
EAP Password: The password of the wireless client for EAP-MD5 or the inner authentication methods of
PEAP and EAP-TTLS.
EAP Certificate Password: The password of the user certificate file.
41

Advertisement

Table of Contents
loading

This manual is also suitable for:

Web-n

Table of Contents