RadioFrame Networks Inc DH2 User Manual

Page of 164
RadioFrame System 
Connecting to the Customer LAN 
RFN_3.1 Beta
  
109 
five pairs of hex digits forming a 40-bit binary string, which is the standard length 
of a WEP key. 
Only one WEP Key can be selected at a time. The selected key is used to 
encrypt 802.11 traffic that is transmitted by a RAP. However, any of the four keys 
may be used by client devices for their transmissions. The determination of which 
key is used by a client device is performed at the client device, usually in a 
manner similar to the way the RAP is configured.  
6.2.3 Enhanced 
Security 
Enhanced Security provides another layer of protection for the RFS 802.11 
implementation. When enabled, or “On”, this setting prevents RAPs from 
broadcasting their SSID information. This helps to prevent unwanted users from 
accessing the customer’s WLAN. When disabled, or “Off”, any system can ‘see’ 
the SSID of RAPs in the customer WLAN. 
6.2.4 
User Access Control 
The RFS provides the ability to restrict access to the customer LAN to certain 
pre-authorized devices. RFN recommends setting the User Access Control 
option to “On” to provide a means to identify those devices that are authorized to 
communicate over the customer’s LAN via the RFS. When this option is disabled, 
set to “Off”, any client device may associate with the RFS. 
Devices are identified by a number that is programmed into the 802.11b network 
interface installed in the device. For instance, laptop PCs typically use a PCMCIA 
card plugged into the laptop’s PCMCIA bay to access an 802.11 network. Every 
802.11b PCMCIA card comes from the manufacturer with a unique serial number 
programmed into it. No two 802.11b devices are ever manufactured with the 
same serial number. 
In IEEE 802 networking terminology, this serial number is called the MAC 
address (Media Access Control address), an addressing mechanism that is 
present in all types of IEEE 802 LANs. The MAC address is typically represented 
as six sets of hexadecimal (base 16) numbers, with two hexadecimal digits in 
each set. The following is an example of how a MAC address may be written: 
 00:04:16:A3:29:B7 
Authorized MAC addresses/devices are listed below the User Control option. To 
learn how to add and remove MAC addresses, read the following section 6.2.5 
Add/Remove MAC Addresses. When you are done adding and removing MAC 
addresses, you’ll select the Save Changes button under User Access Control. 
6.2.5 
Add/Remove MAC Addresses 
Start by collecting a list of MAC addresses for all user devices that will be 
authorized to access the customer’s LAN via the RFS 802.11. It is best to keep a