3Com 3CRWE870075A User Guide - Page 38

WPA Configuration

Page 38 highlights

If you check the Require Windows user authentication check box, clients will be required to enter a user name and password every time they associate with the network. If you leave this box unchecked, the system will authenticate clients based on the access control list and the saved passwords on the clients. 3 Set up a User Access List: There must be at least one entry in the User Access List, which determines the users that can associate with the access point. Click Edit User Access List. In the User Access List page, user names are listed. Scroll to the bottom of the list to perform the following actions: To add a new user, click Add Users. In the next page, type the user name and password in the spaces provided and click Apply. To delete users, click Delete Users. In the next page, check the check boxes next to the names to be deleted and click Apply. To modify a password, click Change Password. In the next page, select the user name from the pull-down list. Enter the new password in the spaces provided and click Apply. CONFIGURING ENCRYPTION There are two types of data encryption available: I WPA-Wi-Fi Protected Access. I WEP-Wired Equivalent Privacy The access point and the wireless devices must have the same encryption settings to communicate. You can choose to allow only clients using WPA encryption, or you can allow both WPA and WEP clients. The following sections describe how to configure each type of encryption. When you are finished configuring the encryption, click Apply. WPA Configuration To configure WPA encryption: 1 Under Encryption, select Enable. 2 Under WPA Configuration, click the Required check box if you want to limit access to clients using WPA encryption. If you also want to allow WEP clients, do not check this box. 3 Select the Multicast Cipher Mode, which determines the method by which keys are computed. 38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54

38
If you check the
Require Windows user authentication
check box, clients will
be required to enter a user name and password every time they associate
with the network. If you leave this box unchecked, the system will
authenticate clients based on the access control list and the saved passwords
on the clients.
3
Set up a User Access List:
There must be at least one entry in the User Access List, which determines the
users that can associate with the access point.
Click
Edit User Access List.
In the User Access List page, user names are listed.
Scroll to the bottom of the list to perform the following actions:
To add a new user, click
Add Users.
In the next page, type the user name and
password in the spaces provided and click
Apply.
To delete users, click
Delete Users.
In the next page, check the check boxes
next to the names to be deleted and click
Apply.
To modify a password, click
Change Password.
In the next page, select the
user name from the pull-down list. Enter the new password in the spaces
provided and click
Apply.
C
ONFIGURING
E
NCRYPTION
There are two types of data encryption available:
WPA—Wi-Fi Protected Access.
WEP—Wired Equivalent Privacy
The access point and the wireless devices must have the same encryption settings
to communicate. You can choose to allow only clients using WPA encryption, or
you can allow both WPA and WEP clients.
The following sections describe how to configure each type of encryption. When
you are finished configuring the encryption, click
Apply.
WPA Configuration
To configure WPA encryption:
1
Under Encryption, select
Enable.
2
Under WPA Configuration, click the
Required
check box if you want to limit
access to clients using WPA encryption. If you also want to allow WEP clients,
do not check this box.
3
Select the Multicast Cipher Mode, which determines the method by which
keys are computed.