3com 3CRWE850075A User Manual

Page of 62
42
There must be at least one entry in the User Access List, which determines the 
users that can associate with the access point. 
Click Edit User Access List. In the User Access List page, user names are listed. 
Scroll to the bottom of the list to perform the following actions:
To add a new user, click Add Users. In the next page, type the user name and 
password in the spaces provided and click Apply.
To delete users, click Delete Users. In the next page, check the check boxes next to 
the names to be deleted and click Apply. 
To modify a password, click Change Password. In the next page, select the user 
name from the pull-down list. Enter the new password in the spaces provided and 
click Apply.
C
ONFIGURING
 E
NCRYPTION
There are two types of data encryption available:
n
WPA—Wi-Fi Protected Access.
n
WEP—Wired Equivalent Privacy
The access point and the wireless devices must have the same encryption settings 
to communicate. You can choose to allow only clients using WPA encryption, or you 
can allow both WPA and WEP clients. 
The following sections describe how to configure each type of encryption. When you 
are finished configuring the encryption, click Apply. 
WPA Configuration
To configure WPA encryption:
1
Under WPA Configuration, click the Required check box if you want to limit 
access to clients using WPA encryption. If you also want to allow WEP clients, do 
not check this box.
2
Select the Cipher Mode, which determines the method by which keys are 
computed. WEP is the weakest Multicast Cipher Mode and is only provided for 
support of legacy clients which do not fully support WPA. Clients associated with 
WPA-TKIP will have unicast packets directed at them with corresponding 
encryption keys. However, with WEP selected as the Cipher Mode, ALL multicast 
traffic is sent out with WEP encryption. It is recommended to only select WEP as 
the Cipher Mode if legacy client support is critical.
AES - Advanced Encryption Standard (Highest Security)
TKIP—(Temporal Key Integrity Protocol) provides per-packet key mixing, a 
message integrity check and a re-keying mechanism