User's Manual

GSM/802.11b RadioFrame System Method of Procedure
Connecting to the Customer LAN
RadioFrame Networks, Inc.
75
6.2.3.3 WEP Keys
When WEP Encryption is enabled, you must enter values for the four WEP keys in order
for the RFS 802.11 implementation to function. WEP Keys are used to encrypt 802.11
traffic that is transmitted by a iRAP.
Each WEP Key has a radio button. When you select the radio button, you can enter,
change, or delete information for that key only. Each WEP key consists of five pairs of
hex digits forming a 40-bit binary string, which is the standard length of a WEP key.
Only one WEP Key can be selected at a time. The selected key is used to encrypt 802.11
traffic that is transmitted by a iRAP. However, any of the four keys may be used by client
devices for their transmissions. The determination of which key is used by a client device
is performed at the client device, usually in a manner similar to the way the iRAP is
configured.
6.2.4 Enhanced Security
Enhanced Security provides another layer of protection for the RFS 802.11
implementation. When enabled, or “On”, this setting prevents iRAPs from broadcasting
their SSID information. This helps to prevent unwanted users from accessing the
customer’s WLAN. When disabled, or “Off”, any system can ‘see’ the SSID of iRAPs in
the customer WLAN.
6.2.5 User Access Control
The RFS provides the ability to restrict access to the customer LAN to certain pre-
authorized devices. If a RADIUS Server is not available for user authentication, RFN
recommends setting the User Access Control option to “On” to provide a means to
identify those devices that are authorized to communicate over the customer’s LAN via
the RFS. When this option is disabled, set to “Off”, any client device may associate with
the RFS.
Devices are Identified by a number that is programmed into the 802.11b/g network
interface installed in the device. For instance, laptop PCs typically use a PCMCIA card
plugged into the laptop’s PCMCIA bay to access an 802.11 network. Every 802.11b/g
PCMCIA card comes from the manufacturer with a unique numeric identifier. No two
devices are ever manufactured with the same identifier.
In IEEE 802 networking terminology, this identifier serial number is the MAC address
(Media Access Control address), an addressing mechanism that is present in all types of
IEEE 802 LANs. The MAC address is typically represented as six sets of hexadecimal
(base 16) numbers, with two hexadecimal digits in each set. The following is an example
of how a MAC address may be written:
00:04:16:A3:29:B7
Authorized MAC addresses/devices are listed below the User Control option. To learn
how to add and remove MAC addresses, read the following section 6.2.5 Add/Remove
MAC Addresses. When you are done adding and removing MAC addresses, you’ll select
the Save Changes button under User Access Control.