User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
Chapter 5: Security
63. Enter a Key Length as a multiple of 8 between 40 and 448 for the Blowfish encryption
method.
Enter a Key Length as a multiple of 8 between 40 and 128 for the CAST128 encryption
method.
This field is visible when Blowfish or CAST128 is selected in the Encryption Algorithm
field.
64. Enter the Key - In encryption key of the inbound policy.
This field is visible when any value except None, Blowfish, or CAST128 is selected in the
Encryption Algorithm field.
Note: The length of the key depends on the algorithm chosen in the Encryption
Algorithm field.
65. Enter the Key - Out encryption key of the inbound policy.
This field is visible when any value except None , Blowfish ,or CAST128 is selected in
the Encryption Algorithm field.
Note: The length of the key depends on the algorithm chosen in the Encryption
Algorithm field.
66. Select one Integrity Algorithm to verify the integrity of the data.
67. Enter the Key - In encryption key of the inbound policy.
The length of the key depends on the algorithm chosen in the Integrity Algorithm field.
68. Enter the Key - Out encryption key of the inbound policy.
The length of the key depends on the algorithm chosen in the Integrity Algorithm field.
69. Click Save to save the changes or Cancel to clear any changes without saving.
Delete an IPsec VPN Policy
1. Connect to the WavePoint 10e either through an Ethernet cable connected to Ethernet
port 3 or 4 or through the computer's wireless options.
2. Use a web browser to access the Configuration pages.
3. On the Security menu, click VPN > IPsec Policies.
The defined IPsec VPN policies are listed in the table.
4. Right-click the IPsec VPN policy to remove and click Delete.
Page 118 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.