Billion 5100 Guía Del Usuario

Descargar
Página de 86
 
35
5.2 Levels of Security 
Wireless security is vital to your network to protect wireless communication between wireless 
stations, access points and the wired network. 
The figure below shows the possible wireless security levels on your BIPAC-5100/5100W. The 
highest security level relies on EAP (Extensible Authentication Protocol) for authentication and 
utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote 
Authentication Dial-In User Service) server either on the WAN or your LAN to provide 
authentication service for wireless stations. 
 
If you do not enable any wireless security on your BIPAC-5100/5100W, your network is 
accessible to any wireless networking device that is within range. 
Use the BIPAC-5100/5100W web configurator to configurator to set up your wireless LAN 
security settings. Refer to the chapter on using the BIPAC-5100/5100W web configurator to 
see how to access the web configurator. 
5.3 Data Encryption with WEP 
WEP encryption scrambles the data transmitted between the wireless stations and the access 
points to keep network communications private. It encrypts unicast and multicast 
communications in a network. Both the wireless stations and the access points must use the 
same WEP key for data encryption and decryption. 
Your BIPAC-5100/5100W allows you to configure up to four 64-bit or 128-bit WEP keys but 
only one key can be enabled at any one time. 
5.4 Configuring Wireless LAN 
Click Wireless LAN, Wireless to open the Wireless screen.