Motorola SURFBOARD SVG2500 User Manual page 113

Wireless voice gateway
Hide thumbs Also See for SURFBOARD SVG2500:
Table of Contents

Advertisement

9 SVG2500 WIRELESS PAGES
Field
WPA
WPA2
WPA-PSK
WPA2-PSK
WPA/WPA2 Encryption
WPA Pre-Shared Key
RADIUS Server
RADIUS Port
RADIUS Key
Group Key Rotation Interval
WPA/WPA2 Re-auth Interval
WEP Encryption
Shared Key Authentication
802.1x Authentication
Description
Enables or disables Wi-Fi Protected Access (WPA) encryption.
Enables or disables a local pre-shared key (WPA-PSK) passphrase.
When using WPA or WPA-PSK authentication, these WPA
encryption modes can be set: TKIP, AES, or TKIP + AES.
AES (Advanced Encryption Standard) provides the strongest
encryption, while TKIP (Temporal Key Integrity Protocol) provides
strong encryption with improved compatibility. The TKIP + AES
mode allows both TKIP and AES-capable clients to connect.
Sets the WPA Pre-Shared Key (PSK). This is either an 8-63 ASCII
character string or a 64-digit hex number. Enabled when the
Network Authentication method is WPA-PSK.
Sets the RADIUS server IP address to use for client authentication
using the dotted-decimal format (xxx.xxx.xxx.xxx).
Sets the UDP port number of the RADIUS server. The default is
1812.
Sets the shared secret for the RADIUS connection. The key is a 0 to
255 character ASCII string.
Sets the WPA Group Rekey Interval in seconds. Set to zero to
disable periodic rekeying.
WPA and WPA2 are two security features in WiFi technology. This
field, re-authentication interval, is the amount of time the wireless
router can wait before re-establishing authentication with the CPE.
Enables or disables Wired Equivalent Privacy encryption.
The WEP protocol uses Shared Key Authentication, which is an
Authentication protocol where the CPE sends an authentication
request to the access point. Then the access point sends a
challenge text to the CPE.
The CPE uses either the 64-bit or 128-bit key to encrypt the
challenge text and sends the encrypted text to the access point. The
access point will decrypt the encrypted text and then compare the
decrypted message with the original challenge text. If they are the
same, the access point will let the CPE connect; if it doesn't match,
then the access point does not let the CPE connect.
This is another type of authentication and is used on top of WEP.
802.1x Authentication is a much stronger type of authentication than
WEP.
98

Advertisement

Table of Contents
loading

Table of Contents