Planet Networking & Communication Hot Spot WSG-403 User Manual page 108

Wireless subscriber gateway
Table of Contents

Advertisement

Item
802.1x
Encryption
Re-key Time
Server IP
Authentication Port 1812
Share Secret Key
Beacon Interval
RTS Threshold
Fragmentation
Threshold
Preamble Type
Authentication
Method
106
Default
Disable
Enables or disables the 802.1x function.
64 bit
The WSG-403 supports 64-bit or 128 bit 802.1x encryption.
86400 Seconds Enter a number in the field to set the force re-keying interval.
Enter the RADIUS server IP address or domain name. The
Empty
maximum allowed characters length is 15.
Enter the authentication port number. The allowed numbers
are from 0 to 65535.
Empty
Enter the RADIUS secret key.
This value valid range is 1 to 1000 indicates the frequency
200
interval of the beacon.
This value valid range is 256-2342. This setting determines
the packet size at which the WSG-403 issues a request to
send (RTS) before sending the packet. A low RTS Threshold
2347
setting can be useful in areas where many client devices are
associating with the WSG-403, or in areas where the clients
are far apart and can detect only the WSG-403 and not each
other.
This setting determines the size at which packets are
fragmented. Enter a setting ranging from 256 to 2432 bytes.
2432
Use a low setting in areas where communication is poor or
where there is a great deal of radio interference.
The preamble type is a section of data at the head of a packet
that contains information the WSG-403 and client devices
Long Preamble
need when sending and receiving packets. The setting menu
allows you to select a long, short or dynamic preamble type.
Select open system, shared Key or both.
Open System—Allows any device to authenticate and then
attempt to communicate with the WSG-403. Using open
authentication, any wireless device can authenticate with the
WSG-403, but the device can only communicate if its WEP
keys match the WSG-403. Devices not using WEP do not
attempt to authenticate with a Wireless Service Gateway that
is using WEP.
Shared
Key—During
WSG-403 sends an unencrypted challenge text string to any
Open System
device attempting to communicate with the WSG-403. The
device-requesting authentication encrypts the challenge text
and sends it back to the WSG-403. If the challenge text is
encrypted correctly, the WSG-403 allows the requesting
device to authenticate. Both the unencrypted challenge and
the encrypted challenge can be monitored, however, which
leaves the WSG-403 open to attack from an intruder who
calculates the WEP key by comparing the unencrypted and
encrypted text strings. Because of this weakness, shared key
authentication can be less secure than open authentication.
Both—With this setting wireless stations can communicate
with or without data encryption.
Description
shared
key
authentication,
the
WSG-403 User Guide

Advertisement

Table of Contents
loading

Table of Contents