User's Manual

25
client only supports WPA. With the "WPA2 Only" option, the router associates only with clients that
also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key
Integrity Protocol) provides per-packet key generation and is based on WEP. AES (Advanced
Encryption Standard) is a very secure block based encryption. With the "TKIP and AES" option, the
router negotiates the cipher type with the client, and uses AES when available.
Group Key Update Interval: The amount of time before the group key used for broadcast and multicast
data is changed.
Group Key Update Interval: The amount of time before the group key used for broadcast and
multicast data is changed.
WPA-Personal
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII
(American Standard Code for Information Interchange) format at both ends of the wireless connection. It
cannot be shorter than eight characters, although for proper security it needs to be of ample length and
should not be a commonly known phrase. This phrase is used to generate session keys that are unique
for each wireless client.
WPA-Enterprise
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have
established the necessary credentials before attempting to authenticate to the Server through this
Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to
authenticate users.
Authentication Timeout: Amount of time before a client will be required to re-authenticate.
RADIUS Server IP Address: The IP address of the authentication server.
RADIUS Server Port: The port number used to connect to the authentication server.
RADIUS Server Shared Secret: A pass-phrase that must match with the authentication server.
Wireless MAC Filtering
Choose the type of MAC filtering needed.
Turn MAC Filtering Disable: When "Disable" is selected, MAC addresses are not used to control
network access.
Add MAC Filtering Rule
Use this section to add MAC addresses to the list below.
MAC Address
Enter the MAC address of a computer that you want to control with MAC filtering. Computers that have
obtained an IP address from the router's DHCP server will be in the DHCP Client List. Select a device
from the drop down menu.










