ADC WFX-3900-16 L11 User Manual page 94

Wireless lan array. wfx-3900 series; wfx-3700 series; wfx-3500 series
Table of Contents

Advertisement

Chapter 4: Configuration
– MAC Address ACLs (Access Control Lists) – MAC address ACLs provide a list of client adapter MAC
addresses that are allowed or denied access to the wireless network. Access Control Lists work well
when there are a limited number of users—in this case, enter the MAC addresses of each user in the
Allow list. In the event of a lost or stolen MAC adapter, enter the affected MAC address in the Deny list.
Procedure for Configuring Network Security
Step
1
WPA Enabled: Choose Yes to enable WPA (Wi-Fi Protected Access), or choose No to disable WPA.
2
TKIP Enabled: Choose Yes to enable TKIP (Temporal Key Integrity Protocol), or choose No to disable
TKIP.
3
AES Enabled: Choose Yes to enable AES (Advanced Encryption Standard), or choose No to disable
AES.
4
WPA Group Rekey Time (in seconds): Enter a value to specify the group rekey time (in seconds). The
default is 600.
5
PSK Authentication: Choose Yes to enable PSK (Pre-Shared Key) authentication, or choose No to
disable PSK.
6
WPA Preshared Key / Verify Key: If you enabled PSK, enter a passphrase here, then re-enter the
passphrase to verify that you typed it correctly.
7
EAP Authentication: Choose Yes to enable EAP (Extensible Authentication Protocol) or choose No to
disable EAP.
Note:
A RADIUS server must be defined to use EAP.
8
WEP Enabled: Choose Yes to enable WEP (Wired Equivalent Privacy) or choose No to disable WEP.
9
Key Length / Mode: If you enabled WEP, choose the desired key length (either 40 or 128) and the mode
(either ASCII or Hex) from the pull-down lists. You must now provide the encryption key(s).
• Encryption Key 1 / Verify Key 1: Enter an encryption key of the length specified (either 10 hex or 26
hex characters), then re-enter the key to verify that you typed it correctly—hexadecimal characters are
defined as ABCDEF and 0-9.
• Encryption Key 2 / Verify Key 2 (optional): If desired, enter a second encryption key, then re-enter
the key to verify that you typed it correctly.
• Encryption Key 3 / Verify Key 3 (optional): If desired, enter a third encryption key, then re-enter the
key to verify that you typed it correctly.
• Encryption Key 4 / Verify Key 4 (optional): If desired, enter a fourth encryption key, then re-enter
the key to verify that you typed it correctly.
10
Default Key: Choose which key you want to assign as the default key. Make your selection from the
pull-down list.
11
Click on the Apply button to apply the new settings to this session.
12
Click on the Save button to save your changes.
Note:
new functionality to take effect.
4-34
After configuring network security, the configuration must be applied to an SSID for the
Action
December 22, 2005
AIWS-UM-4003-01

Advertisement

Table of Contents
loading

Table of Contents