User's Manual

Table Of Contents
Static WEP. WEP (Wired Equivalent Privacy) keys must be manually configured.
Static TKIP (WPA-PSK). Only TKIP (Temporal Key Integrity Protocol) mechanism of WPA
(Wi-Fi Protected Access) is enabled. In this mode, you have to specify the Pre-shared key,
which will be used by the TKIP engine as a master key to generate keys that actually encrypt
outgoing packets and decrypt incoming packets.
NOTE: The number of characters of the Pre-shared key setting must be at least 8 and can be up
to 63.
IEEE 802.1x EAP without Encryption (EAP-MD5). The IEEE 802.1x functionality is en-
abled and the user-name/password-based EAP-MD5 authentication is used. No data encryption.
IEEE 802.1x EAP with Static WEP (EAP-MD5). The IEEE 802.1x functionality is enabled
and the user-name/password-based EAP-MD5 authentication is used. Data encryption is
achieved by static WEP.
IEEE 802.1x EAP with Dynamic WEP (EAP-TLS, EAP-TTLS, PEAP). The IEEE 802.1x
functionality is enabled and dynamic WEP key distribution authentication (EAP-TLS,
EAP-TTLS, or PEAP) is used. Data encryption is achieved by dynamic WEP.
IEEE 802.1x EAP with Dynamic TKIP (WPA). This is a full WPA mode, in which both the
TKIP and IEEE 802.1x dynamic key exchange mechanisms are enabled. The AP is highly se-
cured in this mode.
In the above security modes, a back-end RADIUS (Remote Authentication Dial-In User Service)
server is needed if IEEE 802.1x functionality is enabled. See Section 3.5.3 for more information about
IEEE 802.1x and RADIUS.
When WEP is enabled by a security mode, the Key length can be specified to be 64 Bits or 128 Bits.
The Selected key setting specifies the key to be used as a send-key for encrypting traffic from the AP
side to the wireless client side. All 4 WEP keys are used as receive-keys to decrypt traffic from the
wireless client side to the AP side.
NOTE: Each field of a WEP key setting is a hex-decimal number from 00 to FF. For example, when
the security mode is Static WEP and the key length is 64 Bits, you could set Key 1 to
“00012E3ADF”.
Fig. 52. MAC-address-based access control settings for an AP interface.
With MAC-Address-Based Access Control, you can specify the wireless client computers that are
permitted or not permitted to connect to the AP interface. When the table type is set to inclusive, en-
tries in the table are permitted to connect to the AP interface. When the table type is set to exclusive,
entries in the table are not permitted to connect to the AP interface.
To deny wireless clients’ access to the wireless network:
33