User's Manual Part 1
8
security, Authentication and Data Encryption, the 802.1x wireless network
is more impervious to intruders than has previously been possible.
The Authentication protocol in 802.1x provides the frontline of defense
against network intrusion. EAP (Extensible Authentication Protocol) is the
protocol used for authentication. Windows XP allows you to select the type
of EAP you wish to use. All the clients, access points, and severs must share
the same type of EAP in order to communicate and ensure that the network
is secure.
If you are not using Windows XP, you can purchase EAP software to install
for the wireless clients in your network.
The second level of security in the 802.1x wireless network is WEP data
encryption. Depending on the radius server deployed in your network, you
can distribute the certificate automatically and change Encryption keys in the
wireless network. This network feature will greatly reduce the amount of time
needed to ensure secure networking by automatically changing WEP keys
periodically, thus relieving administrators of the onerous task of manually
changing keys on a multitude of workstations.
Installation Considerations
Designed to go up to 1,312 feet (400 meters) outdoors and up to 328 feet
(100 meters) indoors, D-Link’s AirPlus DWL-700AP lets you access your
network using a wireless connection from virtually anywhere. Keep in mind,
however, that the number, thickness and location of walls, ceilings or other
objects that the wireless signals must pass through may limit the range.
Typical ranges vary depending on the types of materials and background RF
(radio frequency) noise in your home or business. The key to maximizing
wireless range is to follow these basic guidelines:
1.
Keep the number of walls and ceilings between the wireless Access
Point and your receiving device (e.g., the DWL-650) to a minimum -
Each wall or ceiling can reduce your D-Link AirPlus Wireless product’s
range from 3-90 feet (1-30 meters.) Position your Access Points,
Residential Gateways, and computers so that the number of walls or
ceilings is minimized.
2. Be aware of the direct line between Access Points, Residential
Gateways (routers) and computers. A wall that is 1.5 feet thick (.5
meters), at a 45-degree angle appears to be almost 3 feet (1 meter) thick.
At a 2-degree angle it looks over 42 feet (14 meters) thick! Try to make