Step 6: Enabling Wireless Lans (Wlans) - Symbol WS 2000 System Installation Manual

Table of Contents

Advertisement

36
WS 2000 System Installation Guide
1. Check Enable in the PPP over Ethernet area to enable the PPPoE protocol for high-speed
connections.
2. Enter the Username and Password required for authentication. The username and
password are for the switch's router to use when connecting to the ISP. When the Internet
session starts, the ISP authenticates the username.
3. Set the Idle Time to an appropriate number. This number is the amount of time the PPPoE
connection will be idle before it disconnects. The 10000 second (default idle time is
appropriate for most situations).
4. Check Keep Alive to instruct the switch to continue occasional communications over the
WAN even when client communications to the WAN are idle. Some ISPs terminate inactive
connections, while others do not. In either case, enabling Keep-Alive mode keeps the
switch's WAN connection alive, even when there is no traffic. If the ISP drops the connection
after so much idle time, the switch automatically reestablishes the connection to the ISP.
5. Select the appropriate WAN authentication method from the drop-down menu. Collect this
information from the network administrator. Select between None, PAP, CHAP, or PAP or
CHAP.
CHAP
PAP
6. Click the Apply button to save changes.

Step 6: Enabling Wireless LANs (WLANs)

The WS 2000 Wireless Switch works either in a wired or wireless environment; however, the power
of the switch is associated with its support of wireless networks. In order to use the wireless features
of the switch, the administrator needs to enable up to four wireless LANs (WLANs).
A type of authentication in which the person logging in uses secret information and
some special mathematical operations to come up with a number value. The server
the person is logging into knows the same secret value and performs the same
mathematical operations. If the results match, the person is authorized to access the
server. One of the numbers in the mathematical operation is changed after every log-
in, to protect against an intruder secretly copying a valid authentication session and
replaying it later to log in.
An identity verification method used to send a username and password over a
network to a computer that compares the username and password to a table listing
authorized users. This method of authentication is less secure, because the username
and password travel as clear text that a hacker could read.

Advertisement

Table of Contents
loading

Table of Contents