background image

3e–525C–2 Wireless Access Point 

Chapter 1: Introduction

 

 

 

 

 

 

 

 

 

29000155-001 A

3e–525C–2 Wireless Access Point 

Chapter 1: Introduction

29000155-001 A 

5

Network Configuration

The 3e–525C–2 is an access point with bridging setup capability:
•  Access point/Gateway plus:

•  Wireless bridging with choice of:

 

-  Point-to-point setup

 

-  Point-to-multipoint setup

 

-  Repeater setup

Bridging actually has more choices, but the above choices are popular 

and are discussed later in this user guide (Chapter 4).

Access Point Configurations

When a 3e–525C–2 is used as an access point, IP addresses for wireless 

devices are typically assigned by the wired network’s DHCP server. The 

wired LAN’s DHCP server assigns addresses dynamically, and the AP 

virtually connects wireless users to the host wired network. All wireless 

devices connected to the AP are configured on the same subnetwork as 

the wired network interface and can be accessed by devices on the wired 

network. 

Possible AP Topologies

1.   An access point can be used as a stand-alone AP without any 

connection to a wired network. In this configuration, it simply 

provides a stand-alone wireless network for a group of wireless 

devices. 

��

Summary of Contents for AirGuard 3e-525C-2

Page 1: ...AirGuard Wireless Access Point User s Guide Model 3e 525C 2 3e Technologies International 700 King Farm Blvd Suite 600 Rockville MD 20850 301 670 6779 www 3eti com 29000155 001 A publ 05 02 05 ...

Page 2: ...This page intentionally left blank ...

Page 3: ...3e Technologies International s AirGuard Wireless Access Point User s Guide Model 3e 525C 2 ...

Page 4: ... locate a copy of the license contact 3e Technologies International and a copy will be provided to you ___________________________________ UNITED STATES GOVERNMENT LEGEND If you are a United States Government agency then this documentation and the product described herein are provided to you subject to the following All technical data and computer software are commercial in nature and developed so...

Page 5: ... 11 Installation Instructions 12 Minimum System and Component Requirements 12 Connectors and Cabling 13 Bridge Transmit Distance 14 Bridge Antenna Location 14 Outdoor Protection Kit Installation 15 Earth Ground Connection 16 Lighnting Arrestor Installation 16 Antenna Installation 17 Sealing Antenna Connections 17 Mounting Kit Setup 18 The Indicator Lights 18 Chapter 3 Access Point Configuration 21...

Page 6: ...dge Configuration 51 Introduction 51 Wireless Bridge General 52 Auto forming Wireless Bridging 52 Manual Bridging 55 Monitoring 58 Wireless Bridge Encryption 58 Setting Up Bridging Type 59 Point to Point Bridge Configuration 59 Point to Point Bridging Setup Guide Manual Mode 60 Point to Point Bridging Setup Guide Auto Mode 60 Point to Multipoint Bridge Configuration 64 Point to Multipoint Bridging...

Page 7: ...Cautions must be observed to avoid damage to your equipment NOTE Notes contain important information about this product The following warnings appear in this manual WARNING Do not attempt to install any outdoor equip ment during hazardous conditions such as a thunderstorm where lightning could strike the equipment or installer Failure to follow this warning could result in injury or death ...

Page 8: ...vi 29000155 0001 A This page intentionally left blank ...

Page 9: ...desired for the WLAN you can select None Static WEP or WPA WPA uses TKIP or AES CCMP so you can employ legacy client WEP cards and still secure the wireless band The 3e 525C 2 incorporates Power over Ethernet The PoE interface on the 3e 525C 2 is compatible with commercial vendor injected power hub units The 3e 525C 2 includes AES cryptographic modules for wireless encryption and HTTPS TLS for sec...

Page 10: ...ing Rogue AP Detection The following security modules have been implemented in the 3e 525C 2 AES 128 bit for Bridge WEP 64 128 and 152 bit for AP WPA pre share key and TKIP AES CCMP for AP 802 11i WPA2 128 bit for AP Wireless Basics Wireless networking uses electromagnetic radio frequency waves to transmit and receive data Communication occurs by establishing radio links between the wireless acces...

Page 11: ...ates to offer a broader range In this mode all transmissions will be at the highest data rate available 802 11 Super G and Turbo A 802 11 Super G and 802 11 Turbo A technologies provide speed and throughput of more than double standard wireless LAN technologies in networking products such as PCs access points routers and PC cards It is very helpful to users who require additional bandwidth over st...

Page 12: ...3e 525C 2 is used as an access point IP addresses for wireless devices are typically assigned by the wired network s DHCP server The wired LAN s DHCP server assigns addresses dynamically and the AP virtually connects wireless users to the host wired network All wireless devices connected to the AP are configured on the same subnetwork as the wired network interface and can be accessed by devices o...

Page 13: ...nt use is multiple APs connected to a wired network and operating off that network s DHCP server to provide a wider coverage area for wireless devices enabling the devices to roam freely about the entire site The APs have to use the same SSID This is the topology of choice today Bridging The wireless bridging function in the 3e 525C 2 allows use as a bridge in a number of alternate configurations ...

Page 14: ...cess points can enable overlapping wireless networks The SSID can act as a basic password without which the client cannot connect to the network However this is easily overridden by allowing the wireless AP to broadcast the SSID which means any client can associate with the AP SSID broadcasting can be disabled in the 3e 525C 2 setup menus WEP WEP is an older encryption standard but is preferable t...

Page 15: ...ation is the process of proving a client identity The 3e 525C 2 access points if set up to use MAC address filtering detect an attempt to connect by a client and compare the client s MAC address to those on a predefined MAC address filter list Only client addresses found on the list are allowed to associate MAC addresses are pre as signed by the manufacturer for each wireless card DHCP Server The ...

Page 16: ... A Management After initial setup maintenance of the system and programming of security functions are performed by personnel trained in the procedure using the embedded gui based management screens The next chapter covers the basic procedure for setting up the hard ware ...

Page 17: ...less Bridge General Monitoring Encryption AES 128 bit MAC Address Filtering Services Settings DHCP Server SNMP Agent User Management List All Users Edit Delete Add New User Monitoring Reports System Status Bridging Status Bridging Site Map Wireless Clients Adjacent AP List DHCP Client List System Log Web Access Log Network Activities System Administration System Upgrade Firmware Upgrade Local Conf...

Page 18: ...3e 525C 2 Wireless Access Point Chapter 1 Introduction 10 29000155 001 A This page intentionally left blank ...

Page 19: ...a range of 30 degrees C to 70 degrees C The latter version of the product employs ThermoElectric Cooler TEC technology to extend the product into the higher temperature environment The TEC Technology comes with a price it requires power to transfer the heat Unfortunately this raises the electric current requirement to 25 watts beyond the 802 3af specification of 15 4 watts To ensure that the 3e 52...

Page 20: ...n of the device and its identifiable parts so that the user is sufficiently familiar to interact with the physical unit Pre liminary setup information provided below is intended for information and instruction of the wireless LAN system administration personnel It is intended that the user not open the unit Any maintenance re quired is limited to the external enclosure surface cable connections an...

Page 21: ...e unit to the power injector which runs DC power through the Ethernet cable to the unit The Ethernet cable is thus run from the 3e 525C 2 to the power injector which is then connected to a power source and the wired LAN A second LAN Port Ethernet connector is designed for use during initial configuration only This uses an RJ45 cable to connect the 3e 525C 2 to a laptop The following diagram demons...

Page 22: ... loss Where LP free space path loss between antennas F frequency in GHz D path length in miles Bridge Antenna Location When as bridge device the 3e 525C may need to be mounted out doors on a high place to achieve the best bridge result The Fresnel zone and Earth bulge dominate to decide how high that the unit s Antenna need be put The total antenna height equals the width of Fresnel zone plus the ...

Page 23: ...ction Kit must be installed This kit contains lightning arrestors for each antenna and the required cabling to connect these items to the common grounding stud on the 3e 525C 2 unit NOTE You the user are required to ensure that the connection to a proper earth ground is made by properly certified and authorized person nel and must conform to all applicable codes and regulations The materi als requ...

Page 24: ... lightning arrestor attach one end of the lightning ar restor to the 3e 525C 2 s antenna connector Attach the antenna or the antenna cable to the other end of the lightning arrestor Attach the ring terminal from the Lightning Arrestors ground cable to the grounding stud on the 3e 525C 2 unit The lightning arrestor s ring terminal should be attached to the unit after the earth ground ring terminal ...

Page 25: ...cess Point General screen and set the Tx Pwr Mode to Off see Chapter 3 Sealing Antenna Connections Once all antennas have been installed the connections should be sealed to protect them from the exterior harsh environment Use a self amalgamating polyisobutylene tape which over a period of hours ad heres to itself and forms a single amalgamated rubber molding conform ing to the shape of the item it...

Page 26: ...aximum gain for the direc tional antenna should be 14 dBi Mounting Kit Setup To mount the 3e 525C 2 outdoors you should choose a suitable post to mount the unit high in the air Use the U ring screws and nuts to attach the mounting plate to the post Next attach the 3e 525C 2 to the mounting plate with screws The Indicator Lights The top panel of the 3e 525C 2 contains a set of indicator lights Ligh...

Page 27: ... to the network WLAN1 Activity This light may be steady or blinking and indicates that information is passing through the AP connection WLAN2 Activity This light may be steady or blinking and indicates that information is passing through the Bridge connection WLAN Signal Strength The Strength LED indicator indicates the strength of the Bridge connection WLAN2 1 LED Off means no connection on the b...

Page 28: ...3e 525C 2 Wireless Access Point Chapter 2 Hardware Installation 20 29000155 001 A This page intentionally left blank ...

Page 29: ... operating systems installed Windows NT 4 0 Windows 2000 or Windows XP A web browser program such as Microsoft Internet Explorer 5 5 or later or Netscape 6 2 or later installed on the PC laptop used for configuring the access point IP address a list of IP addresses available on the organization s LAN that are available to be used for assignment to the AP s Subnet Mask for the LAN Default IP addres...

Page 30: ...on for Obtain an IP address automatically is checked In Windows 2000 XP follow the path Start à Settings à Net work and Dialup Connections à Local Area Connection and select the Properties button In the Properties window highlight the TCP IP protocol and click properties Make sure that the radio button for Obtain an IP address automatically is checked Once the DHCP server has recognized your lapto...

Page 31: ...l be locked The excep tion is if you are the last active CryptoOfficer on the system then your account will not be locked The User Management List All Users screen displays account status If an account is locked it will show a status of Locked and a reason of bad passwd Other accounts show status as Active and reason Normal The CryptoOfficer is the only role that can unlock an account once it has ...

Page 32: ...r 3e 525C 2 and allows you to set the Host Name and Domain Name as well as establish system date and time Host and Domain Names are both set at the fac tory for default but can optionally be assigned a unique name for each You can also enter a description of the physical location of the unit in the Physical Location field This is useful when deploying units to remote lcoations When you are satisfi...

Page 33: ...or System Configu ration WAN This directs you to the System Configuration WAN screen If not using DHCP to get an IP address input the static IP information that the access point requires in order to be managed from the wired LAN This will be the IP address Subnet Mask Default Gateway and where needed DNS 1 and 2 Click Apply to accept changes ...

Page 34: ... the System Configuration LAN screen This sets up the default numbers for the four octets for a possible pri vate LAN function for the access point It also allows changing the default numbers for the LAN Subnet Mask The Local LAN port provides local access for configuration It is not advisable to change the private LAN ad dress while doing the initial setup as you are connected to that LAN ...

Page 35: ...ach wireless device that will be part of the WLAN The Wireless Access Point General screen lists the MAC Address of the AP card This is not the MAC Address that will be used for the BS SID for bridging setup however That is found on the Wireless Bridge General screen If you will be using an SSID for a wireless LAN enter it here and in the setup of each wireless client This nomenclature has to be s...

Page 36: ...hen channel 11 and then continue with 1 6 11 you will have the optimum frequency spread to decrease noise If you click on the button Select the optimal channel a popup screen will display the choices It will select the optimal channel for you You can also set it up to automatically select the optimal channel at boot up CHANNEL NO OPTIONS Wireless Mode Channel No 802 11b 802 11g 802 11b g Mixed 1 2...

Page 37: ...RTS threshold the RTS CTS handshaking is performed DTIM 1 255 The number of beacon intervals that broadcast and multicast traffic is buffered for a client in power save mode Basic Rates Basic Rates for 802 11b 1 and 2 Mbps 1 2 5 5 and 11 Mbps The basic rates used and reported by the AP The highest rate specified is the rate that the AP uses when transmitting broadcast multicast and management fram...

Page 38: ...ing of no encryption but for security reasons it will not commu nicate to any clients unless the encryption is set by the CryptoOfficer No Encryption In order to have the 3e 525C 2 work with no encryption you must actively select None and click Apply A screen will appear asking if you really want to operate in Bypass mode If you answer Yes no encryption will be applied ...

Page 39: ...ength This key is initially shown in plain text so the user has the opportunity to copy the key Once the key is applied the key is no longer displayed in plain text WEP Wired Equivalent Privacy Encryption is a security protocol for wireless local area networks WLANs defined in the IEEE 802 11 stan dard WEP was originally designed to provide the same level of security for wireless LANs as that of a...

Page 40: ...er authentication is enabled using the exten sible authentication protocol EAP If you wish to use WPA on the 3e 525C 2 enable either WPA Pre shared Key Settings or WPA 802 1x Settings If you are a SOHO user selecting pre shared key means that you don t have the expense of installing a Radius Server Simply input up to 63 character numeric hexadecimals in the Passphrase field If your clients use WPA...

Page 41: ...3e 525C 2 Wireless Access Point Chapter 3 Access Point Configuration 29000154 001 A 33 If you will be using MAC Address filtering navigate next to the MAC Address Filtering screen ...

Page 42: ...ped with the authorized MAC addresses will be able to communicate with the access point In this case input the MAC addresses of all the PC cards that will be authorized to access this access point The MAC ad dress is engraved or written on the PC PCMCIA Card If Filtering is enabled and Filter Type is Allow All Except Those Listed Below those devices with a MAC address which has been entered in the...

Page 43: ...s for notification of any rogue or non trusted APs The MAC Address for the 3e 525C 2 is located on the System Configuration General screen You can also select the follow ing filter options SSID FIlter Check the SSID option to only send rogue APs that match the AP s SSID or wireless bridge s SSID Channel Filter Check the channel filter option to only send rogue APs that match the AP s channel or th...

Page 44: ...oad balancing feature bal ances the wireless clients between APs If two APs with similar settings are in a conference room depending on the location of the APs all wire less clients could potentially associate with the same AP leaving the other AP unused Load balancing attempts to evenly distribute the wireless clients on both APs Once you have made any changes click Apply to save Wireless Bridge ...

Page 45: ...he Local LAN port The default factory setting for the DHCP server function is enabled You can disable the DHCP server function if you wish but it is not recommended You can also set the range of addresses to be assigned The Lease period after which the dynamic address can be reassigned can also be varied The DHCP server function accessible only from the LAN port is used for initial configuration o...

Page 46: ...the SNMP Manager which usually resides on a network administra tor s computer The SNMP Manager function interacts with the SNMP Agent to execute applications to control and manage object variables interface features and devices in the gateway Common forms of managed infor mation include number of packets received on an interface port status dropped packets and so forth SNMP is a simple request and...

Page 47: ... or name where the information is ob tained Access Control Defines the level of management interaction per mitted If using SNMPv3 enter a username minimum of eight characters authentication type with key and data encryption type with a key This configuration information will also need to be entered in your MIB man ager setup User Management List All Users The User Management List All Users screen ...

Page 48: ...word role and note fields The Password Generator button creates a random password so that you don t need to create one Initially the password is shown in plain text so that you can copy it Once the Apply button is pressed the password is no longer shown Add New User The User Management Add New User screen allows you to add new Administrators and CryptoOfficers assigning and confirming the password...

Page 49: ...riety of lists and status reports Most of these are self explanatory System Status The Monitoring Report System Status screen displays the status of the 3e 525C 2 device the network interface and the routing table There are some pop up informational menus that give detailed infor mation about CPU PCI Interrupts Process and Interfaces ...

Page 50: ...ter 3 Access Point Configuration 42 29000154 001 A Bridging Status The Monitoring Report Bridging Status screen displays the Eth ernet Port STP status Ethernet DSL Port STP status Wireless Port STP status and Wireless Bridging information ...

Page 51: ...ing tree network topology of both wired and wireless nodes connected to the network The root STP node is always on top and the nodes of the hierarchy are displayed below it Wired links are double dotted lines and wireless links are single dotted lines This map does not update dynamically You must press the Update button to refresh the map ...

Page 52: ... Monitoring Report Adjacent AP List screen shows all the APs on the network If you select the check box next to any AP shown the AP will thereafter be accepted by the 3e 525C 2 as a trusted AP These APs are detected by the AP s wireless card 2 4 GHz band and the wireless bridge s wireless card 5 8GHz band The list of APs are only within the band that can be seen from a particular channel For examp...

Page 53: ... check mark the Revoke Entry selection and click Remove to confirm the action System Log The Monitoring Report System Log screen displays system facil ity messages with date and time stamp These are messages documenting functions performed internal to the system based on the system s func tionality Generally the Administrator would only use this information if trained as or working with a field en...

Page 54: ...etc using the web browser It establishes a running record regarding what actions were performed and by whom The Web access log will continue to accumulate listings If you wish to clear listings manually use the Clear button Network Activity The Network Activity Log keeps a detailed log of all activities on the network which can be useful to the network administration staff The Network Activities l...

Page 55: ...window There is also a configuration file transfer option which allows the system configuration file from one AP to be transferred to another AP in order to minimize the administration of the APs Only configura tion parameters that can be shared between APs are downloaded in the configuration file WAN IP address and hostname are not transferred in the configuration file Click on the Local Configur...

Page 56: ...passphrase for that file The passphrase protects the file from unauthorized users It prevents unauthorized users from applying the system configuration file to an unauthorized AP to gain access to the network Before downloading the system configuration file to a local com puter the user must enter a passphrase to protect the file Before the sys tem configuration file can be uploaded onto another A...

Page 57: ...n You can also reset the 3e 525C 2 to its factory default by pressing and holding the reset button located on the front of the unit for 10 seconds Input is acknowledged by the WLANNSS LED turning on and then turn ing off after 10 seconds Remote Logging The System Administration Remote Logging screen allows you to forward the syslog data from each machine to a central remote logging server In the 3...

Page 58: ...tions have access to this function You can also reboot the 3e 525C 2 by pressing and holding the reset button on the front of the unit for five seconds Input is acknowledged by the LWLANSS LED turning on Utilities The System Administration Utilities screen gives you ready access to two useful utilities Ping and Traceroute Simply enter the IP Address or hostname you wish to ping or traceroute and c...

Page 59: ...ode The wireless bridging screens are the same whether you are in access point or gateway mode Bridging is a function that is set up in addition to basic access point setup If you will be using the 3e 525C 2 solely as a bridge some of the settings you may have selected for access point use will not be necessary If setting up as a bridge during initial setup you can either use the LAN Port directly...

Page 60: ...f operation Manual wireless bridging Auto forming wireless bridging AWB with a maximum num ber of allowable bridges the default is 40 Auto forming Wireless Bridging When the wireless bridge is in auto forming mode the wireless bridge sniffs for beacons from other wireless bridges and identifies APs that match a policy such as SSID and channel Instead of simply adding the APs with the same SSID cha...

Page 61: ...o select the optimal rate for the chan nel If a fixed rate is used the card will only transmit at that rate 802 11a Turbo AUTO The card attempts to select the opti mal rate for the channel Channel No 802 11b g Mixed 1 2 412 GHz 2 2 417 GHz 3 2 422 GHz 4 2 427 GHz 5 2 432 GHz 6 2 437 GHz 7 2 442 GHz 8 2 447 GHz 9 2 452 GHz 10 2 457 GHz 11 2 462 GHz Sets the channel frequency for the wireless bridge...

Page 62: ...n Rx Pwr Mode is set to FIXED Level 1 is the shortest distance Level 1 7dBm and Level 5 is the longest Level 5 15dBm Propagation Distance 5 Miles 5 10 Miles 11 15 Miles 16 20 Miles 21 25 Miles 26 30 Miles 30 Miles Set the distance based on the distance between this bridge and furthest bridge that is connected to it Bridging Mode Auto Bridging auto bridging selected SSID Can be any set of letters a...

Page 63: ... 2 Wireless Access Point Chapter 4 Wireless Bridge Configuration 29000155 001 A 55 Manual Bridging When the wireless bridge is in manual bridging mode you can manu ally add the MAC address of the remote bridge ...

Page 64: ...imal rate for the channel 802 11a AUTO 6 9 12 18 24 36 48 54 Mbps When set to AUTO the card attempts to select the optimal rate for the channel If a fixed rate is used the card will only transmit at that rate 802 11a Turbo AUTO The card attempts to select the optimal rate for the channel Channel No 802 11b g Mixed 1 2 412 GHz 2 2 417 GHz 3 2 422 GHz 4 2 427 GHz 5 2 432 GHz 6 2 437 GHz 7 2 442 GHz ...

Page 65: ...Miles 11 15 Miles 16 20 Miles 21 25 Miles 26 30 Miles 30 Miles Set the distance based on the distance between this bridge and furthest bridge that is connected to it Bridging Mode Manual Bridging manual bridging selected Signal Strength LED MAC Allows you to set the number of one of the Remote APs which will be listed at the bottom of the screen once the system is operational This wireless bridge ...

Page 66: ...om 5 seconds to 30 minutes Refreshing the screen allows you to see the effect of aiming the antenna to improve signal strength Wireless Bridge Encryption The Wireless Bridge Encryption screen is used to configure static encryption keys for the wireless bridge This is an important page to set up to ensure that your bridge is working correctly The encryption key that you use on this screen must be t...

Page 67: ...he same channel number Be cause there is a separate WLAN card for bridging there can be a separate WLAN on the AP WLAN card with no loss efficiency as long as you set the channel numbers so there s no conflict or noise with the channel as signed to the bridge Spanning Tree Protocol may be set to Enable if there is any possibility of a bridging loop or to Disable which is more efficient if there s ...

Page 68: ...idge 2 Select appropriate key type length and value Must be the same key as Bridge 1 Point to Point Bridging Setup Guide Auto Mode Direction Bridge 1 Bridge 2 Wireless Bridge Genral Auto Bridging Mode Wirelss Mode 802 11a 802 11a Tx Rate AUTO AUTO Channel No Must be the same as Bridge 2 Must be the same as Bridge 1 Tx Power Mode Auto Auto Propagation Distance 5 Miles 5 Miles Bridging Mode Auto bri...

Page 69: ...your changes but remain on this screen Next is Bridging Mode Select either manual or auto bridging If you choose manual then you will have to manually add the BSSID of the remote bridge The BSSID corresponds to that bridge s MAC address In entering the BSSID enter only hexadecimal numbers no colons Data entry is not case sensitive You may also enter a note that defines the location of the remote b...

Page 70: ...less Access Point Chapter 4 Wireless Bridge Configuration 62 29000155 001 A If you choose auto bridging mode then enter the Max Auto Bridges range from 1 40 Bridge Priority range from 1 40 and the Signal Strength MAC ...

Page 71: ... and type for Bridge 1 must be the same as for Bridge 2 For wireless bridging only AES is available for encryption You must complete the configuration of your Bridge 1 by following the general instructions in Chapter 3 of this guide to establish any other required configuration options such as General WAN and LAN settings Configure the second of your two point to point bridges following the instru...

Page 72: ... others BSSIDs while Bridge 2 n must only contain Bridge 1 s BSSID The BSSID of each is equivalent to the MAC address found on the Wireless Bridge General page Enter only hexadecimal numbers Data entry is not case sensitive Finally the wireless bridging encryption of each must be set to the appro priate type and key length and must be the same on all Because the 3e 525C 2 has two separate WLAN car...

Page 73: ...on Bridge 1 Bridge 2 n Wireless Bridge General Auto Bridging Mode Wirelss Mode 802 11a 802 11a Tx Rate AUTO AUTO Channel No Same as Bridge 2 n Same as Bridge 2 n Tx Power Mode Auto Auto Propagation Distance 5 Miles 5 Miles Bridging Mode Auto bridging selected Auto bridging selected SSID Must be the same as Bridge 2 n Must be the same as Bridge 2 Max Auto Bridges 40 range 1 40 40 range 1 40 Bridge ...

Page 74: ...to Auto Auto Propagation Dis tance 5 Miles 5 Miles 5 Miles Bridging Mode manual manual manual Signal Strength LED MAC Not Assigned select from drop down list Not Assigned select from drop down list Not Assigned select from drop down list Spanning Tree Protocol Enable or Disable if no bridging loop possible Enable or Disable if no bridging loop possible Enable or Disable if no bridging loop possibl...

Page 75: ...he bottom of the screen Enter from list at the bottom of the screen Wireless Bridge Encyption Wireless Configu ration Bridging Encryption Select appropriate key type length and enter key value Must be the same as that on the other 2 Bridges Select appropriate key type length and enter key value Must be the same as that on the other 2 Bridges Select appropriate key type length and enter key value M...

Page 76: ...3e 525C 2 Wireless Access Point Chapter 4 Wireless Bridge Configuration 68 29000155 001 A ...

Page 77: ...mmission s Rules and Regulations These limits are designed to pro vide reasonable protection against harmful interference when the equip ment is operated in a commercial environment This equipment gener ates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications Operation of this equ...

Page 78: ...3e 525C 2 Wireless Access Point Chapter 5 Technical Support 70 29000155 001 A This page intentionally left blank ...

Page 79: ... U S government adopted the algorithm as its encryption technique in October 2000 replacing the DES encryption it used AES works at multiple network layers simultaneously Bridge A device that connects two local area networks LANs or two segments of the same LAN that use the same protocol such as Ethernet or Token Ring DHCP Short for Dynamic Host Configuration Protocol DHCP is a protocol for assign...

Page 80: ...er operate as a group TKIP Temporal Key Integrity Protocol TKIP is a protocol used in WPA It scrambles the keys using a hashing algorithm and by adding an integrity checking feature ensures that the keys haven t been tampered with VPN Virtual Private Network A VPN uses encryption and other security mechanisms to ensure that only authorized us ers can access the network and that the data cannot be ...

Reviews: