Linksys WRE54G Cisco WAP54GP Wireless-G Exterior Access Point User Guide - Page 58

WPA Enterprise, WPA RADIUS, RADIUS - instructions

Page 58 highlights

Wireless-G Exterior Access Point System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication DialIn User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP. WPA Enterprise. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys. WPA RADIUS. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) First, select the type of WPA algorithm, TKIP or AES. Enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys. RADIUS. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) First, enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Then, select a WEP key and a level of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. Implementing encryption may have a negative impact on your network's performance, but if you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security 49 Security Threats Facing Wireless Networks

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76

49
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Exterior Access Point
System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-
In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.
WPA Enterprise
. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter
a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time
between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the
encryption keys.
WPA RADIUS
. WPA used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router or other device.) First, select the type of WPA algorithm,
TKIP
or
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between
the device and the server. Last, enter a Group Key Renewal period, which instructs the device how often
it should change the encryption keys.
RADIUS
. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the Router or other device.) First, enter the RADIUS server’s IP Address and port
number, along with a key shared between the device and the server. Then, select a WEP key and a level
of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key
manually.
Implementing encryption may have a negative impact on your network’s performance, but if you are
transmitting sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most
flexible and convenient technology Linksys has to offer.