Hantech Corporation WG100R Manuale Utente

Pagina di 13
 
14
use an external authentication server (e.g., RADIUS) and EAP just like IEEE 802.1X is using or pre-
shared keys without need for additional servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-
Personal", respectively. Both mechanisms will generate a master session key for the Authenticator (AP) 
and Supplicant (client station). 
802.1X: 
The original security mechanism of IEEE 802.11 standard was not designed to be strong and 
has proven to be insufficient for most networks that require some kind of security. Task group I (Security) 
of IEEE 802.11 working group has worked to address the flaws of the base standard and in practice 
completed its work in May 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was 
approved in June 2004 and published in July 2004. 
WPA Cipher suite
/WPA2 Cipher suite:The encryption piece of WPA and WPA2 mandates the use of 
TKIP or, because it's considered to be more secure than TKIP, preferably AES encryption.  
Pre-Shared Key Format:
 You can select  PASSPHRASE or HEX(64 CHARACTERS). 
Pre-Shared Key: 
You can input 128 characters key. 
Authentication RADIUS Server:
input Port and IP Address and Password. 
 
4.2.4 Wireless Access Control 
 
If you choose 'Allowed Listed', only those clients whose wireless MAC addresses are in the 
access control list will be able to connect to your Access Point. When 'Deny Listed' is selected, these 
wireless clients on the list will not be able to connect the Access Point. 
 
4.2.5 WDS Settings 
Wireless Distribution System uses wireless media to communicate with other APs, like the Ethernet does. 
To do this, you must set these APs in the same channel and set MAC address of other APs which you 
want to communicate with in the table and then enable the WDS