Configuring Encryption; Wpa Configuration - 3Com 3CRWE870075A - Wireless LAN Access Point 8700 User Manual

Wireless lan access points
Hide thumbs Also See for 3CRWE870075A - Wireless LAN Access Point 8700:
Table of Contents

Advertisement

If you check the Require Windows user authentication check box, clients will
be required to enter a user name and password every time they associate
with the network. If you leave this box unchecked, the system will
authenticate clients based on the access control list and the saved passwords
on the clients.
3
Set up a User Access List:
There must be at least one entry in the User Access List, which determines the
users that can associate with the access point.
Click Edit User Access List. In the User Access List page, user names are listed.
Scroll to the bottom of the list to perform the following actions:
To add a new user, click Add Users. In the next page, type the user name and
password in the spaces provided and click Apply.
To delete users, click Delete Users. In the next page, check the check boxes
next to the names to be deleted and click Apply.
To modify a password, click Change Password. In the next page, select the
user name from the pull-down list. Enter the new password in the spaces
provided and click Apply.
C
E
ONFIGURING
NCRYPTION
There are two types of data encryption available:
WPA—Wi-Fi Protected Access.
I
WEP—Wired Equivalent Privacy
I
The access point and the wireless devices must have the same encryption settings
to communicate. You can choose to allow only clients using WPA encryption, or
you can allow both WPA and WEP clients.
The following sections describe how to configure each type of encryption. When
you are finished configuring the encryption, click Apply.
WPA Configuration
To configure WPA encryption:
1
Under Encryption, select Enable.
2
Under WPA Configuration, click the Required check box if you want to limit
access to clients using WPA encryption. If you also want to allow WEP clients,
do not check this box.
3
Select the Multicast Cipher Mode, which determines the method by which
keys are computed.
38

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

8200850087003crwe820096a3crwe850075a

Table of Contents