User's Manual

Table Of Contents
Advanced Configuration
Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 65
4.5 Security Configuration
4.5.1 Setting Up Wireless Security
In Wireless Security page, you can configure security mechanisms used to secure the communication link between End Point
A and End Point B. By default, a security profile (WORP Security) is preconfigured with the default configuration for WORP
security. However, more profiles can be created as required. Even though multiple security profiles can be created, only one
security profile can be active at a time. The active security profile is configured as part of the WORP property Security Profile
Name. For a security profile to be active, it must be enabled. Refer to Configuring WORP Properties in End Point A Mode
for details.
NOTES:
The active security profile parameters on the End Point A and End Point B should match for the connection to work
as desired.
A maximum of eight security profiles can be created.
To configure the Wireless security properties
1. Click ADVANCED CONFIGURATION > Security > Wireless Security. The Wireless Security Configuration screen is
displayed as shown below.
Figure 4-12 Wireless Security Configuration
2. Select the appropriate parameters. See the following table that lists the parameters and their descriptions.
3. Click OK.
NOTES:
By default, WORP Security is added to the wireless security configuration.
Default authentication mode is WORP.
Field Description
Profile Name Specifies the security profile name.
Entry status Used to enable or disable the security profile.
Edit Click Edit to modify the Profile parameters.