User`s guide
Table Of Contents
- About This User's Guide
- Document Conventions
- Safety Warnings
- Table of Contents
- Part I: Introduction
- 1. Getting to Know Your MWR222
- 2.
- 2. Introducing the Web Configurator
- 3. Monitor
- 4.
- 4.
- 4. MWR222 Modes
- 5. Router Mode
- 6. Access Point Mode
- 5.
- 5.
- 7. WISP Mode
- 7
- 7
- 8 Tutorials
- 8.3 Connecting to Internet from an Access Point
- 8.4 Configuring Wireless Security Using WPS
- 9 Wireless LAN
- 9.1 Overview
- 9.2 What You Can Do
- Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
- 9.3 What You Should Know
- 9.4 General Wireless LAN Screen
- 9.5 Security
- 9.6 MAC Filter
- 9.7 Wireless LAN Advanced Screen
- 9.8 Quality of Service (QoS) Screen
- 9.9 WPS Screen
- 9.10 WPS Station Screen
- 9.11 Scheduling Screen
- 9.12 WDS Screen
- 10.1 Overview
- 10.2 What You Can Do
- 10.3 What You Need To Know
- 10.2
- 10.3
- 10.4 Internet Connection
- 10.5 Mobile WAN
- 10.7 IGMP Snooping Screen
- 11 LAN
- 12 DHCP Server
- 13. Network Address Translation (NAT)
- 14 Dynamic DNS
- 15. OpenDNS
- 16 Static Route
- 17.
- 17.
- 17. Routing Information Protocol
- Part III
- Part V
- Maintenance and Troubleshooting
- Part VI
- Appendices and Index
- Appendix A
- Pop-up Windows, JavaScripts and Java Permissions
- End-User License Agreement for “MWR222”
- NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software. For at least three (3) years from the date of distribution of t...
- Notice
- Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any p...
- Notice
- GNU GENERAL PUBLIC LICENSE
- GNU LESSER GENERAL PUBLIC LICENSE
MWR211 User’s Guide
273
instead of user-specific credentials. The common-password approach makes
WPA-PSK susceptible to brute-force password-guessing attacks but it's still an
improvement over WEP as it employs an easier-to-use, consistent, single,
alphanumeric password.
User Authentication
WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP)
to authenticate wireless clients using an external RADIUS database.
If both an AP and the wireless clients support WPA2 and you have an external
RADIUS server, use WPA2 for stronger data encryption. If you don't have an
external RADIUS server, you should use WPA2 -PSK (WPA2 -Pre-Shared Key) that
only requires a single (identical) password entered into each access point,
wireless gateway and wireless client. As long as the passwords match, a wireless
client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK
depending on whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or
WPA2. WEP is less secure than WPA or WPA2.
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The
Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII
characters (including spaces and symbols).
2 The AP checks each wireless client's password and (only) allows it to
join the network if the password matches.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP or AES encryption process to
encrypt data exchanged between them.