D-Link DWL-8500AP Product Manual - Page 51

WPA Personal Configuration, WPA Personal, WPA Versions, WPA2., WPA and WPA2., Cipher

Page 51 highlights

4 Configuring Access Point Security PSK is used for an initial check of credentials only. This security mode is backwardscompatible for wireless clients that support the original WPA. If you select WPA Personal as the Security Mode, additional fields display, as Figure 12 shows. Figure 12. WPA Personal Configuration Table 13 describes the configuration options for the WPA Personal security mode. Table 13. WPA Personal Field Description WPA Versions Select the types of client stations you want to support: • WPA. If all client stations on the network support the original WPA but none support the newer WPA2, then select WPA. • WPA2. If all client stations on the network support WPA2, we suggest using WPA2 which provides the best security per the IEEE 802.11i standard. • WPA and WPA2. If you have a mix of clients, some of which support WPA2 and others which support only the original WPA, select both of the check boxes. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA configuration allows more interoperability, at the expense of some security. Cipher Suites Select the cipher suite you want to use: • TKIP • CCMP (AES) • TKIP and CCMP (AES) Both TKIP and AES clients can associate with the access point. WPA clients must have one of the following to be able to associate with the AP: • A valid TKIP key • A valid AES-CCMP key Clients not configured to use WPA Personal will not be able to associate with the AP. Key The pre-shared key is the shared secret key for WPA Personal. Enter a string of at least 8 characters to a maximum of 63 characters. NOTE: After you configure the security settings, you must click Update to apply the changes and to save the settings. Changing some access point settings might cause the AP to stop and restart system processes. If this happens, wireless clients will temporarily lose connectivity. We recommend that you change access point settings when WLAN traffic is low. Configuring Virtual Access Point Security 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

Configuring Virtual Access Point Security
51
4
Configuring Access Point Security
PSK is used for an initial check of credentials only. This security mode is backwards-
compatible for wireless clients that support the original
WPA
.
If you select WPA Personal as the Security Mode, additional fields display, as
Figure 12
shows.
Figure 12. WPA Personal Configuration
Table 13
describes the configuration options for the WPA Personal security mode.
NOTE:
After you configure the security settings, you must click
Update
to apply the
changes and to save the settings. Changing some access point settings might
cause the AP to stop and restart system processes. If this happens, wireless
clients will temporarily lose connectivity. We recommend that you change
access point settings when WLAN traffic is low.
Table 13.
WPA Personal
Field
Description
WPA Versions
Select the types of client stations you want to support:
WPA.
If all client stations on the network support the original
WPA
but
none support the newer
WPA2
, then select WPA.
WPA2.
If all client stations on the network support
WPA2
, we suggest
using WPA2 which provides the best security per the
IEEE 802.11i
standard.
WPA and WPA2.
If you have a mix of clients, some of which support
WPA2
and others which support only the original
WPA
, select both of
the check boxes. This lets both WPA and WPA2 client stations
associate and authenticate, but uses the more robust WPA2 for clients
who support it. This WPA configuration allows more interoperability,
at the expense of some security.
Cipher Suites
Select the cipher suite you want to use:
TKIP
CCMP (AES)
TKIP and CCMP (AES)
Both TKIP and AES clients can associate with the access point. WPA
clients must have one of the following to be able to associate with the AP:
A valid TKIP key
A valid AES-CCMP key
Clients not configured to use
WPA Personal
will not be able to associate
with the AP.
Key
The pre-shared key is the shared secret key for
WPA
Personal. Enter a string
of at least 8 characters to a maximum of 63 characters.