Product Manual
Page 7
Changes to the network. The process does not require manual intervention, but is enabled Clustering and Auto-Management Automatic setup with Kickstart Provisioning and auto-configuration of the cluster...; Wireless Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Advanced Encryption Standard (AES) User based access control with local authentication server Local user database and user life-cycle management MAC address filtering Out-of-the-Box Guest Interface Unique network name (SSID) ...
Changes to the network. The process does not require manual intervention, but is enabled Clustering and Auto-Management Automatic setup with Kickstart Provisioning and auto-configuration of the cluster...; Wireless Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Advanced Encryption Standard (AES) User based access control with local authentication server Local user database and user life-cycle management MAC address filtering Out-of-the-Box Guest Interface Unique network name (SSID) ...
Product Manual
Page 13
...user interface. The following table describes the minimum requirements for configuration. For more details on this step, see "Wireless Client Computers" in order to the Network After initial configuration and launch of Your Wireless Network. The DWL-2210AP must be installed into a DHCP-enabled network in this manual.... 13 Prelaunch Checklist Administrator's Computer Configuration and administration of the D-Link DWL-2210AP is accomplished with the D-Link DWL-2210AP. Connect ...
...user interface. The following table describes the minimum requirements for configuration. For more details on this step, see "Wireless Client Computers" in order to the Network After initial configuration and launch of Your Wireless Network. The DWL-2210AP must be installed into a DHCP-enabled network in this manual.... 13 Prelaunch Checklist Administrator's Computer Configuration and administration of the D-Link DWL-2210AP is accomplished with the D-Link DWL-2210AP. Connect ...
Product Manual
Page 14
... Web browser must have JavaScript enabled to support the interactive features of the administration interface. It detects D-Link DWL-2210APs on the CD-ROM. CD-ROM Drive Security Settings The administrator's computer must have a CD-ROM drive .../ Operating System KickStart Wizard on CD-ROM Description Configuration and administration of the D-Link DWL-2210AP is provided through a Web-based user interface hosted on any Windows laptop or computer that security is connected to the access point ..."Quick Steps for Setup and Launch of Your Wireless Network" in this manual.
... Web browser must have JavaScript enabled to support the interactive features of the administration interface. It detects D-Link DWL-2210APs on the CD-ROM. CD-ROM Drive Security Settings The administrator's computer must have a CD-ROM drive .../ Operating System KickStart Wizard on CD-ROM Description Configuration and administration of the D-Link DWL-2210AP is provided through a Web-based user interface hosted on any Windows laptop or computer that security is connected to the access point ..."Quick Steps for Setup and Launch of Your Wireless Network" in this manual.
Product Manual
Page 16
... used to the authentication mode used by the access point and provide a valid username and password, certificate, or similar user identity proof. Prelaunch Checklist Wireless Client Computers (continued) Required Software or Component Client Security Settings Description Security should be disabled on the... access point, see the "Configuring Security" section in this manual. 16 If the Security mode on the access point is set to anything other than plain text, wireless clients will need to set...
... used to the authentication mode used by the access point and provide a valid username and password, certificate, or similar user identity proof. Prelaunch Checklist Wireless Client Computers (continued) Required Software or Component Client Security Settings Description Security should be disabled on the... access point, see the "Configuring Security" section in this manual. 16 If the Security mode on the access point is set to anything other than plain text, wireless clients will need to set...
Product Manual
Page 27
Once you have the default configuration described in "Default Settings for the D-Link DWL-2210AP" in this manual. If you can add in the PreLaunch Checklist: Default Settings and Supported Administrator/Client Platforms for information on the access point. Default Configuration ... access point with it -you follow the steps above and accept all the defaults, the access point will have tested the basics of security, add users, configure a Guest interface, and fine-tune performance settings. 27 Make Sure the Access Point is Connected to the LAN If you can...
Once you have the default configuration described in "Default Settings for the D-Link DWL-2210AP" in this manual. If you can add in the PreLaunch Checklist: Default Settings and Supported Administrator/Client Platforms for information on the access point. Default Configuration ... access point with it -you follow the steps above and accept all the defaults, the access point will have tested the basics of security, add users, configure a Guest interface, and fine-tune performance settings. 27 Make Sure the Access Point is Connected to the LAN If you can...
Product Manual
Page 34
... with the built-in authentication server, see "Understanding Clustering" in this manual. The clustering icon indicates whether the current access point is "Clustered" or "Not Clustered" (that is indicated by the "User Accounts" icon. The number of access points available for service on this... network is shown. For information about setting up user accounts on the Administration pages for an access point in this manual. Your Network at a Glance: Understanding Indicator Icons All the Cluster settings tabs on your network...
... with the built-in authentication server, see "Understanding Clustering" in this manual. The clustering icon indicates whether the current access point is "Clustered" or "Not Clustered" (that is indicated by the "User Accounts" icon. The number of access points available for service on this... network is shown. For information about setting up user accounts on the Administration pages for an access point in this manual. Your Network at a Glance: Understanding Indicator Icons All the Cluster settings tabs on your network...
Product Manual
Page 39
...can re-enable cluster mode on a standalone access point. (See "Adding an Access Point to a Cluster" in this manual.) Cluster Formation A cluster is formed when the first D-Link DWL-2210AP is configured. (See "Quick Steps for an access point in standalone mode, you will be redirected to the... cluster. Cluster Size and Membership The upper limit of Cluster Configuration If you are making changes to as adding several new users), you may encounter a synchronization progress bar after clicking "Update" on its own. Configure "Basic Settings" and start the wireless ...
...can re-enable cluster mode on a standalone access point. (See "Adding an Access Point to a Cluster" in this manual.) Cluster Formation A cluster is formed when the first D-Link DWL-2210AP is configured. (See "Quick Steps for an access point in standalone mode, you will be redirected to the... cluster. Cluster Size and Membership The upper limit of Cluster Configuration If you are making changes to as adding several new users), you may encounter a synchronization progress bar after clicking "Update" on its own. Configure "Basic Settings" and start the wireless ...
Product Manual
Page 44
... (enabled or disabled) are shown at the top of up or modify user accounts, click the Cluster > Users tab. Under "Add a User," provide information in this manual.) Adding a User To create a new user, do the following fields. Fields Username Description Provide a user name. Viewing User Accounts User accounts are shown. You make modifications to an existing...
... (enabled or disabled) are shown at the top of up or modify user accounts, click the Cluster > Users tab. Under "Add a User," provide information in this manual.) Adding a User To create a new user, do the following fields. Fields Username Description Provide a user name. Viewing User Accounts User accounts are shown. You make modifications to an existing...
Product Manual
Page 48
...with RADIUS server or other reason. A MAC address is described below . Indicates the amount of the user's client device (station). A station is currently connected. Note: This field is not receiving or...1x security mode and local authentication server. (For more information about monitoring associations and link integrity monitoring, see "IEEE 802.1x" in megabits per second (Mbps) 48 Data...;guring Security" .) For clients of a network. For information about this manual. Indicates the location of IEEE 802.1x clients. A client station can shift from the...
...with RADIUS server or other reason. A MAC address is described below . Indicates the amount of the user's client device (station). A station is currently connected. Note: This field is not receiving or...1x security mode and local authentication server. (For more information about monitoring associations and link integrity monitoring, see "IEEE 802.1x" in megabits per second (Mbps) 48 Data...;guring Security" .) For clients of a network. For information about this manual. Indicates the location of IEEE 802.1x clients. A client station can shift from the...
Product Manual
Page 64
... The following sections describe how to configure Security settings on the D-Link DWL-2210AP: • Understanding Security Issues on Wireless Networks • How Do I ...in the sections below. By using a sophisticated antenna on Wireless Networks Wireless mediums are described in this manual. 64 A wireless NIC broadcasts radio signals over a physical medium such as coaxial cable or twisted ... LAN to the network from many miles away. The D-Link DWL-2210AP provides a number of authentication and encryption schemes to compromise your wireless infrastructure is accessed only by...
... The following sections describe how to configure Security settings on the D-Link DWL-2210AP: • Understanding Security Issues on Wireless Networks • How Do I ...in the sections below. By using a sophisticated antenna on Wireless Networks Wireless mediums are described in this manual. 64 A wireless NIC broadcasts radio signals over a physical medium such as coaxial cable or twisted ... LAN to the network from many miles away. The D-Link DWL-2210AP provides a number of authentication and encryption schemes to compromise your wireless infrastructure is accessed only by...
Product Manual
Page 65
...the best choice if all client stations are equipped with WPA supplicants. To prevent clients from access to sensitive information, this manual.) Following is not advertised. Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms Three major factors that you con... configuring security on a guest network, plain text mode (no security) may require that determine the effectiveness of integrated user authentication in some modes an authentication algorithm, and whether to allow clients not using the CCMP (AES) encryption algorithm provides the ...
...the best choice if all client stations are equipped with WPA supplicants. To prevent clients from access to sensitive information, this manual.) Following is not advertised. Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms Three major factors that you con... configuring security on a guest network, plain text mode (no security) may require that determine the effectiveness of integrated user authentication in some modes an authentication algorithm, and whether to allow clients not using the CCMP (AES) encryption algorithm provides the ...
Product Manual
Page 66
... key management, authentication, and encryption algorithms used . We include some suggestions as "plain text" across the network. In this manual. No key management, data encryption or user authentication is not encrypted but rather sent as to when one mode might be more appropriate than another. • When to ...is the only mode in each mode. Therefore, use on the network are configured with a description of the security modes available on the D-Link DWL-2210AP along with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV) or 128-bit (104-bit secret key + 24...
... key management, authentication, and encryption algorithms used . We include some suggestions as "plain text" across the network. In this manual. No key management, data encryption or user authentication is not encrypted but rather sent as to when one mode might be more appropriate than another. • When to ...is the only mode in each mode. Therefore, use on the network are configured with a description of the security modes available on the D-Link DWL-2210AP along with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV) or 128-bit (104-bit secret key + 24...
Product Manual
Page 67
..."Open System", no authentication is set to encrypt the frame body and cyclic redundancy checking (CRC) of user authentication. See Also For information on the D-Link DWL -2210AP). However, if the Authentication Algorithm is performed. Therefore, Static WEP is a newer, more secure standard ... not recommended as a secure mode. When to "Both", only WEP clients are indexed in this manual. Configuring Security Key Management Encryption Algorithm User Authentication Static WEP uses a fixed key that is the standard for passing the Extensible Authentication ...
..."Open System", no authentication is set to encrypt the frame body and cyclic redundancy checking (CRC) of user authentication. See Also For information on the D-Link DWL -2210AP). However, if the Authentication Algorithm is performed. Therefore, Static WEP is a newer, more secure standard ... not recommended as a secure mode. When to "Both", only WEP clients are indexed in this manual. Configuring Security Key Management Encryption Algorithm User Authentication Static WEP uses a fixed key that is the standard for passing the Extensible Authentication ...
Product Manual
Page 68
...Kerberos, and public key authentication with Remote Authentication Dial-In User Service (RADIUS) is a Wi-Fi Alliance subset of IEEE... IEEE 802.1x mode is a better choice than using the D-Link DWL-2210AP embedded RADIUS server or an external RADIUS server. WPA with RADIUS...of each station. Recommendations An RC4 stream cipher is used to authenticate users. Therefore, IEEE 802.1x mode is not as secure a solution...changed periodically. Configuring Security Key Management Encryption Algorithm User Authentication IEEE 802.1x provides dynamicallygenerated keys that of Static...
...Kerberos, and public key authentication with Remote Authentication Dial-In User Service (RADIUS) is a Wi-Fi Alliance subset of IEEE... IEEE 802.1x mode is a better choice than using the D-Link DWL-2210AP embedded RADIUS server or an external RADIUS server. WPA with RADIUS...of each station. Recommendations An RC4 stream cipher is used to authenticate users. Therefore, IEEE 802.1x mode is not as secure a solution...changed periodically. Configuring Security Key Management Encryption Algorithm User Authentication IEEE 802.1x provides dynamicallygenerated keys that of Static...
Product Manual
Page 70
... Advanced Encryption Algorithm (AES), and Counter mode/CBC-MAC Protocol (CCMP) mechanisms. This mode offers the same encryption algorithms as this manual. See Also For information on the network that support only 802.1x and some older ones that one is upgrading a current 802.... do not support WPA, you can configure WPA with RADIUS (with RADIUS" under "Configuring Security Settings" in WEP. 70 Encryption Algorithm User Authentication • Te m p o r a l Key I n t e g r i t y Protocol (TKIP) • Counter mode/CBC-MAC Protocol (CCMP) Advanced Encryption Standard (AES) ...
... Advanced Encryption Algorithm (AES), and Counter mode/CBC-MAC Protocol (CCMP) mechanisms. This mode offers the same encryption algorithms as this manual. See Also For information on the network that support only 802.1x and some older ones that one is upgrading a current 802.... do not support WPA, you can configure WPA with RADIUS (with RADIUS" under "Configuring Security Settings" in WEP. 70 Encryption Algorithm User Authentication • Te m p o r a l Key I n t e g r i t y Protocol (TKIP) • Counter mode/CBC-MAC Protocol (CCMP) Advanced Encryption Standard (AES) ...
Product Manual
Page 80
...user accounts, see "Managing User Accounts" in this option, you type. (The D-Link DWL-2210AP internal authentication server key is secret.) This value is 127.0.0.1.) For information on . 80 they are not configurable. (The D-Link DWL-2210AP is the shared secret key for the different services it provides. If you choose this manual... Radius Key is hard-coded to track and measure the resources a particular user has consumed such system time, amount of the RADIUS server. (The D-Link DWL-2210AP internal authentication server is never sent over the network. Note: The RADIUS ...
...user accounts, see "Managing User Accounts" in this option, you type. (The D-Link DWL-2210AP internal authentication server key is secret.) This value is 127.0.0.1.) For information on . 80 they are not configurable. (The D-Link DWL-2210AP is the shared secret key for the different services it provides. If you choose this manual... Radius Key is hard-coded to track and measure the resources a particular user has consumed such system time, amount of the RADIUS server. (The D-Link DWL-2210AP internal authentication server is never sent over the network. Note: The RADIUS ...
Product Manual
Page 83
... access point are automatically provided. • External - If you choose this access point. 83 Link DWL-2210AP. If you choose this manual. On the current release of the D-Link DWL-2210AP, the RADIUS server User Datagram Protocol (UDP) ports used by clicking one of the RADIUS server. (The D-Link DWL-2210AP internal authentication server is 127.0.0.1.) For information on setting up...
... access point are automatically provided. • External - If you choose this access point. 83 Link DWL-2210AP. If you choose this manual. On the current release of the D-Link DWL-2210AP, the RADIUS server User Datagram Protocol (UDP) ports used by clicking one of the RADIUS server. (The D-Link DWL-2210AP internal authentication server is 127.0.0.1.) For information on setting up...
Product Manual
Page 131
...Authentication Server, configure wireless clients as described in "IEEE 802.1x Client Using EAP/PEAP" in this manual. • If the D-Link DWL-2210AP is configured to use either IEEE 802.1x or WPA with RADIUS security mode. (The built-in ... to Recognize the D-Link DWL-2210AP" in this manual. • "Obtaining a TLS-EAP Certificate for a Client Network Infrastructure and Choosing Between Built-in or External Authentication Server Network security configurations including Public Key Infrastructures (PKI), Remote Authentication Dial-in User Server (RADIUS) servers...
...Authentication Server, configure wireless clients as described in "IEEE 802.1x Client Using EAP/PEAP" in this manual. • If the D-Link DWL-2210AP is configured to use either IEEE 802.1x or WPA with RADIUS security mode. (The built-in ... to Recognize the D-Link DWL-2210AP" in this manual. • "Obtaining a TLS-EAP Certificate for a Client Network Infrastructure and Choosing Between Built-in or External Authentication Server Network security configurations including Public Key Infrastructures (PKI), Remote Authentication Dial-in User Server (RADIUS) servers...