User's Manual

17
Re-authentication time: The time period that AP informs clients to re-authenticate.
Radius Server:
1. Primary Radius Server: The IP address and port number of Primary Radius Server. You
need to know the shared secret between AP and Radius Server. The default port number is 1812.
2. Backup Radius Server: The IP address, shared secret, and port number of backup Radius
Server. It is optional.
n 11g
In this window you can make changes to the default wireless settings. For communicating, all
computers on the network must be within the same IP Address range, and have the same settings for
the Radio channel and SSID. If you dont want to utilize WEP Encryption, select None to disable
this function.
1. SSID: The SSID is a unique name shared among all points in your wireless network. The
SSID must be identical for all points in the network. It is case sensitive and must not
exceed 32 characters. The default SSID for 11g Interface is wireless_11g.
2. Channel: The channel shared by all wireless devices. The range of channel is 1~14.
3. WEP: Short for Wired Equivalent Privacy, a security protocol for wireless local area
networks (WLANs) defined in the 802.11a standard. WEP is designed to provide the same
level of security as that of a wired LAN. Select None to disable this function.
There are two WEP Encryption key length: 64-bit(10 hex digits) 128 bit(26 hex digits) and
152 bit(32 hex digits).
n Data Rate: Specify the transmit and receive data rate. Select the desired rate from the
drop-down menu.
n Transmit Power: Specify the level of the transmit power. Use the drop-down menu to
specify the value of the transmit power.
n Beacon Interval (20~1000): Beacon transmissions announce the existence of 802.11
network at regular intervals. Enter a value between 20 and 1000 to specify the Beacon
Interval.
n Data Beacon Rate (1~16384): Specify the Data Beacon Rate. Enter a value between 1
and 16384 that specify the Delivery Traffic Indication Message (DTIM).
n Fragment Length (256~2346): Enter a value between 256 and 3346 to specify the
Fragment Length.
Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the
successor to the Secure Sockets Layer.
2
MD5- provides basic security and is analogous to the challenge handshake authentication protocol (CHAP). MD5 is intended for use
with signal signature applications, which require that large files must be compressed by a secure method before being encrypted with a
secret key, under a public key cryptosystem.
3
TTLS- provides mutual authentication, supports legacy password protocols and does not require clients to have certificates. As a result,
enterprises can reduce the costs associated with operating a certificate authority to distribute and revoke user certificates.