RadioFrame Networks Inc DH2 User Manual
RadioFrame System
Connecting to the Customer LAN
RFN_3.1 Beta
109
five pairs of hex digits forming a 40-bit binary string, which is the standard length
of a WEP key.
of a WEP key.
Only one WEP Key can be selected at a time. The selected key is used to
encrypt 802.11 traffic that is transmitted by a RAP. However, any of the four keys
may be used by client devices for their transmissions. The determination of which
key is used by a client device is performed at the client device, usually in a
manner similar to the way the RAP is configured.
encrypt 802.11 traffic that is transmitted by a RAP. However, any of the four keys
may be used by client devices for their transmissions. The determination of which
key is used by a client device is performed at the client device, usually in a
manner similar to the way the RAP is configured.
6.2.3 Enhanced
Security
Enhanced Security provides another layer of protection for the RFS 802.11
implementation. When enabled, or “On”, this setting prevents RAPs from
broadcasting their SSID information. This helps to prevent unwanted users from
accessing the customer’s WLAN. When disabled, or “Off”, any system can ‘see’
the SSID of RAPs in the customer WLAN.
implementation. When enabled, or “On”, this setting prevents RAPs from
broadcasting their SSID information. This helps to prevent unwanted users from
accessing the customer’s WLAN. When disabled, or “Off”, any system can ‘see’
the SSID of RAPs in the customer WLAN.
6.2.4
User Access Control
The RFS provides the ability to restrict access to the customer LAN to certain
pre-authorized devices. RFN recommends setting the User Access Control
option to “On” to provide a means to identify those devices that are authorized to
communicate over the customer’s LAN via the RFS. When this option is disabled,
set to “Off”, any client device may associate with the RFS.
pre-authorized devices. RFN recommends setting the User Access Control
option to “On” to provide a means to identify those devices that are authorized to
communicate over the customer’s LAN via the RFS. When this option is disabled,
set to “Off”, any client device may associate with the RFS.
Devices are identified by a number that is programmed into the 802.11b network
interface installed in the device. For instance, laptop PCs typically use a PCMCIA
card plugged into the laptop’s PCMCIA bay to access an 802.11 network. Every
802.11b PCMCIA card comes from the manufacturer with a unique serial number
programmed into it. No two 802.11b devices are ever manufactured with the
same serial number.
interface installed in the device. For instance, laptop PCs typically use a PCMCIA
card plugged into the laptop’s PCMCIA bay to access an 802.11 network. Every
802.11b PCMCIA card comes from the manufacturer with a unique serial number
programmed into it. No two 802.11b devices are ever manufactured with the
same serial number.
In IEEE 802 networking terminology, this serial number is called the MAC
address (Media Access Control address), an addressing mechanism that is
present in all types of IEEE 802 LANs. The MAC address is typically represented
as six sets of hexadecimal (base 16) numbers, with two hexadecimal digits in
each set. The following is an example of how a MAC address may be written:
address (Media Access Control address), an addressing mechanism that is
present in all types of IEEE 802 LANs. The MAC address is typically represented
as six sets of hexadecimal (base 16) numbers, with two hexadecimal digits in
each set. The following is an example of how a MAC address may be written:
00:04:16:A3:29:B7
Authorized MAC addresses/devices are listed below the User Control option. To
learn how to add and remove MAC addresses, read the following section 6.2.5
Add/Remove MAC Addresses. When you are done adding and removing MAC
addresses, you’ll select the Save Changes button under User Access Control.
learn how to add and remove MAC addresses, read the following section 6.2.5
Add/Remove MAC Addresses. When you are done adding and removing MAC
addresses, you’ll select the Save Changes button under User Access Control.
6.2.5
Add/Remove MAC Addresses
Start by collecting a list of MAC addresses for all user devices that will be
authorized to access the customer’s LAN via the RFS 802.11. It is best to keep a
authorized to access the customer’s LAN via the RFS 802.11. It is best to keep a