User's Manual
Table Of Contents
- Your Feedback Please
- How to Contact Us
- ProSoft Technology® Product Documentation
- Important Safety Information
- Recommended Antennas
- Antenna spacing requirements for user safety
- 1 Start Here
- 2 RLX2 Quick Setup
- 3 Planning the Network
- 4 Installing the Radios
- 5 Diagnostics and Troubleshooting
- 6 Detailed Radio Configuration / Diagnostics
- 7 RadioLinx Industrial Hotspot Browser
- 8 Reference
- 8.1 Product Overview
- 8.2 Compatibility with ProSoft RLXIB Series Radios
- 8.3 Dimensional Drawings
- Master Channel-Frequency Table
- 8.4 FCC Emission Regulations
- 8.5 Radio hardware
- 8.6 RLX2-IHA Detailed Specifications
- 8.7 RLX2-IHG Detailed Specifications
- 8.8 RLX2-IHNF Detailed Specifications
- 8.9 RLX2-IHW Detailed Specifications
- 9 Antenna Configuration
- 10 Support, Service & Warranty
- Glossary of Terms
- 802.11
- 802.11a
- 802.11b
- 802.11g
- 802.11i
- 802.11n
- Access Point
- Ad hoc Mode
- AES
- Amplifier
- Antenna
- ASCII
- Association
- Authenticate
- Authentication Server
- Band
- Bandwidth
- Base Station
- Baud Rate
- bps
- CACT
- Channel
- Channel Move Time
- Client, Radio Mode
- Client, Software
- Configuration PC
- dBi
- dBm
- DCE
- Decibel (dB)
- Default Gateway
- Device-to-Device Network (Peer-to-Peer Network)
- DFS
- DHCP
- Direct Sequence Spread Spectrum
- Directional Antenna
- Diversity Antenna
- DTE
- Dual Band
- EAP
- EIRP
- Encryption
- ESD
- ESSID
- Firmware
- Frequency Hopping
- Frequency Hopping Spread Spectrum
- Fresnel Zone
- Full-Duplex
- Gain
- Gateway
- Guard Interval (GI)
- Half-Duplex
- Hz
- IEEE
- IP Address
- Key
- LAN
- LED
- Line of Sight (LoS)
- Link point
- MAC ID
- Master device
- Mbps
- Megahertz
- MIC
- MIMO
- Modbus
- Modem
- Network
- Node
- Non-Occupancy Period
- Null Modem Cable
- Panel Antenna
- Parabolic Antenna
- Peer-to-Peer Network
- Point-Multipoint (Broadcast) Network
- Point-Multipoint (Modbus) Network
- Point-to-Multipoint
- Point-to-Point Network
- Poll
- Power Supply
- Protocol
- QoS
- Range
- Remote Access Point
- Remote device
- Repeater
- Repeater, Radio Mode
- RS-232
- RTU (Remote Terminal Unit)
- Sector Antenna
- Signal Diversity
- Signal Loss
- Signal Strength
- Simplex
- Site Survey
- Spectrum
- Spread Spectrum
- SSI
- Subnet Mask
- TKIP
- UART
- WAP
- WDS
- WEP
- Wi-Fi
- Wi-Fi CERTIFIED™
- Wi-Fi Interoperability Certificate
- Wi-Fi Protected Setup
- Wireless Gateway
- Wireless Network
- WLAN
- WPA
- WPA2
- Yagi Antenna
- Index
Detailed Radio Configuration / Diagnostics RLX2 Series ♦ 802.11a, b, g, n
User Manual Industrial Hotspot
6.3 Security settings
The following security settings can be configured:
Field
Description
Encryption type (page
79)
WPA-AES is the preferred encryption method. It contains the latest
updates to the 802.11 standards for best security. However, some
legacy devices do not yet support these updates. Therefore, a few
combinations of legacy methods can be selected.
Available encryption types are:
None (not recommended)
WPA-AES - Latest security setting using WPA (pre-shared key)
authentication and AES encryption.
WPA-TKIP - Security setting using WPA (pre-shared key)
authentication and TKIP encryption.
WEP128 - Legacy security setting using a 128-bit key and WEP
encryption.
WEP64 - Legacy security setting using a 64-bit key and WEP
encryption.
WPA phrase (page 79)
WPA pass phrase of between eight and 63 normal keyboard
characters.
WEP key (page 80)
Five normal text characters in the WEP key field
MAC Filter (page 81)
Restricts connections by MAC address.
Edit Filter
Opens the MAC filter (page 81) form, allowing the specification of the
MAC addresses of devices to allow in the network.
Hide Network SSID (page
81)
Hides the Network SSID (Network Name) from other 802.11 users.
Clients can connect to the "hidden" network by typing the Network
SSID.
The following topics describe each security setting in more detail.
Page 78 of 161 ProSoft Technology, Inc.
November 29, 2012