User Guide
Page 23
...with MAC address filtering, rogue AP detection, layer 2 isolation and an internal authentication server. NWA-3500/NWA-3550 User's Guide 23 Illustrations used throughout this book are based on the NWA-3500 (unless otherwise stated). 1.1 Overview This chapter introduces the main applications and features of your ... Quality of users. It also provides a high level of network traffic security, supporting IEEE 802.1x, Wi-Fi Protected Access (WPA), WPA2 and WEP data encryption. Your NWA is highly versatile, featuring dual wireless modules and supporting up to install, configure and use.
...with MAC address filtering, rogue AP detection, layer 2 isolation and an internal authentication server. NWA-3500/NWA-3550 User's Guide 23 Illustrations used throughout this book are based on the NWA-3500 (unless otherwise stated). 1.1 Overview This chapter introduces the main applications and features of your ... Quality of users. It also provides a high level of network traffic security, supporting IEEE 802.1x, Wi-Fi Protected Access (WPA), WPA2 and WEP data encryption. Your NWA is highly versatile, featuring dual wireless modules and supporting up to install, configure and use.
User Guide
Page 149
... use layer 2 isolation on this BSS's traffic. • In the pre-configured VoIP_SSID profile, the QoS setting is not user-configurable. NWA-3500/NWA-3550 User's Guide 149 The VoIP setting is available only on the VoIP_SSID profile, and provides the highest level of that QoS setting to ...8226; If you select ATC from the QoS list, the NWA automatically assigns priority based on packet size. • If you select ATC+WMM from the drop-down list box. It controls WLAN transmission priority on packets to certified Wi-Fi wireless networks. If a packet has no priority to use ...
... use layer 2 isolation on this BSS's traffic. • In the pre-configured VoIP_SSID profile, the QoS setting is not user-configurable. NWA-3500/NWA-3550 User's Guide 149 The VoIP setting is available only on the VoIP_SSID profile, and provides the highest level of that QoS setting to ...8226; If you select ATC from the QoS list, the NWA automatically assigns priority based on packet size. • If you select ATC+WMM from the drop-down list box. It controls WLAN transmission priority on packets to certified Wi-Fi wireless networks. If a packet has no priority to use ...
User Guide
Page 156
...Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) Most Secure WPA2 The available security modes in to the wireless network before they cannot use it. No ...wireless stations and the access points to get a valid user name and password. This option does not support data encryption. 156 NWA-3500/NWA-3550 User's Guide It provides additional accounting and control features. Unauthorized wireless devices can make every user log in your users. ...
...Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) Most Secure WPA2 The available security modes in to the wireless network before they cannot use it. No ...wireless stations and the access points to get a valid user name and password. This option does not support data encryption. 156 NWA-3500/NWA-3550 User's Guide It provides additional accounting and control features. Unauthorized wireless devices can make every user log in your users. ...
User Guide
Page 157
Wi-Fi Protected Access (WPA) is further converted by a wireless access point and a client during a previous secure connection. In WEP security mode, it with a pre-assigned key, making the information readable only to use either WPA-PSK or WPA2- NWA-3500/NWA-3550 User's Guide 157 PSK... depending on which security mode the wireless client uses. • WPA2-PSK. The NWA when used to as a wireless client employs Temporal Key Integrity Protocol (TKIP)...
Wi-Fi Protected Access (WPA) is further converted by a wireless access point and a client during a previous secure connection. In WEP security mode, it with a pre-assigned key, making the information readable only to use either WPA-PSK or WPA2- NWA-3500/NWA-3550 User's Guide 157 PSK... depending on which security mode the wireless client uses. • WPA2-PSK. The NWA when used to as a wireless client employs Temporal Key Integrity Protocol (TKIP)...
User Guide
Page 163
...this field. Table 42 Security: WPA LABEL DESCRIPTION Profile Name Type a name to identify this screen to set the selected profile to Wi-Fi Protected Access (WPA) security mode. Security Mode Choose WPA in the Security Mode field to display the following table describes the labels ...wireless station needs to enter the user name and password again before access to the wired network is 0, which means the reauthentication off. NWA-3500/NWA-3550 User's Guide 163 Idle Timeout Apply Reset Note: If wireless station authentication is 3600 seconds (or 1 hour). The default time ...
...this field. Table 42 Security: WPA LABEL DESCRIPTION Profile Name Type a name to identify this screen to set the selected profile to Wi-Fi Protected Access (WPA) security mode. Security Mode Choose WPA in the Security Mode field to display the following table describes the labels ...wireless station needs to enter the user name and password again before access to the wired network is 0, which means the reauthentication off. NWA-3500/NWA-3550 User's Guide 163 Idle Timeout Apply Reset Note: If wireless station authentication is 3600 seconds (or 1 hour). The default time ...
User Guide
Page 298
...1x Prevents wireless clients associated with your NWA from communicating with other (R)STP-compliant bridges in authentication. 298 NWA-3500/NWA-3550 User's Guide MBSSID mode allows the NWA to operate up to authenticate users. WMM (Wi-Fi MultiMedia) QoS (Quality of the NWA, the antenna on the right is ...) to 8 different wireless networks (BSSs) simultaneously, each with other wireless clients, APs, computers or routers in the area. The NWA can use in your network to ensure that only one path exists between any two stations on public-private key pairs. Certificates provide ...
...1x Prevents wireless clients associated with your NWA from communicating with other (R)STP-compliant bridges in authentication. 298 NWA-3500/NWA-3550 User's Guide MBSSID mode allows the NWA to operate up to authenticate users. WMM (Wi-Fi MultiMedia) QoS (Quality of the NWA, the antenna on the right is ...) to 8 different wireless networks (BSSs) simultaneously, each with other wireless clients, APs, computers or routers in the area. The NWA can use in your network to ensure that only one path exists between any two stations on public-private key pairs. Certificates provide ...
User Guide
Page 336
...Least Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with it. 336 NWA-3500/NWA-3550 User's Guide Appendix B Wireless LANs several intermediate rate steps between wireless clients, access points and the wired network. The ...wireless security methods available on your network to associate with RADIUS Server Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure Note: You must enable the same wireless security settings on the NWA and on the NWA are as follows: Table 96 IEEE 802.11g DATA RATE (MBPS) ...
...Least Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with it. 336 NWA-3500/NWA-3550 User's Guide Appendix B Wireless LANs several intermediate rate steps between wireless clients, access points and the wired network. The ...wireless security methods available on your network to associate with RADIUS Server Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure Note: You must enable the same wireless security settings on the NWA and on the NWA are as follows: Table 96 IEEE 802.11g DATA RATE (MBPS) ...
User Guide
Page 340
...configure a default encryption key in corporate environments, but they will be used while Dynamic WEP is not necessary to a WLAN. 340 NWA-3500/NWA-3550 User's Guide Server No Yes Yes Dynamic Key Exchange No Yes Yes Credential Integrity None Strong Strong Deployment Difficulty Easy Hard Moderate...Protection No No Yes PEAP Yes Optional Yes Yes Strong Moderate Yes LEAP Yes No No Yes Moderate Moderate No WPA and WPA2 Wi-Fi Protected Access (WPA) is generated with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and...
...configure a default encryption key in corporate environments, but they will be used while Dynamic WEP is not necessary to a WLAN. 340 NWA-3500/NWA-3550 User's Guide Server No Yes Yes Dynamic Key Exchange No Yes Yes Credential Integrity None Strong Strong Deployment Difficulty Easy Hard Moderate...Protection No No Yes PEAP Yes Optional Yes Yes Strong Moderate Yes LEAP Yes No No Yes Moderate Moderate No WPA and WPA2 Wi-Fi Protected Access (WPA) is generated with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and...
User Guide
Page 341
... for every data packet and by creating an integrity checking mechanism (MIC), with and the packet is used to generate unique temporal encryption NWA-3500/NWA-3550 User's Guide 341 Appendix B Wireless LANs If the AP or the wireless clients do not support WPA2, just use Advanced Encryption... that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. WPA and WPA2 use WPA or WPA-PSK depending on a Wi-Fi network than WPA or WPA2. AES (Advanced Encryption Standard) is that uses a 256-bit mathematical algorithm called Rijndael. The common-password approach ...
... for every data packet and by creating an integrity checking mechanism (MIC), with and the packet is used to generate unique temporal encryption NWA-3500/NWA-3550 User's Guide 341 Appendix B Wireless LANs If the AP or the wireless clients do not support WPA2, just use Advanced Encryption... that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. WPA and WPA2 use WPA or WPA-PSK depending on a Wi-Fi network than WPA or WPA2. AES (Advanced Encryption Standard) is that uses a 256-bit mathematical algorithm called Rijndael. The common-password approach ...
User Guide
Page 406
..., 26, 28 web configurator 23, 37, 39 WEP 23 WEP encryption 159 Wi-Fi Multimedia QoS 149 Wi-Fi Protected Access 23, 340 wired network 23, 24, 25 wireless channel 295 wireless client WPA supplicants 342 Wireless Distribution System (WDS) 28 NWA-3500/NWA-3550 User's Guide Index related documentation 3 remote management limitations 196 repeater 25 reset...
..., 26, 28 web configurator 23, 37, 39 WEP 23 WEP encryption 159 Wi-Fi Multimedia QoS 149 Wi-Fi Protected Access 23, 340 wired network 23, 24, 25 wireless channel 295 wireless client WPA supplicants 342 Wireless Distribution System (WDS) 28 NWA-3500/NWA-3550 User's Guide Index related documentation 3 remote management limitations 196 repeater 25 reset...