Dell PowerConnect W-IAP92 Dell Instant 6.1.2.3-2.0.0.0 User Guide - Page 49

Access, Allow any to all destinations, Edit Rule box, New Rule, Finish, Networks

Page 49 highlights

Table 8 Conditions for Adding a Voice Network-Security Tab (Continued) If then, You want to use the default security level, Personal, You select the Open security level Perform the following steps: 1. Select the required key options from the Key management drop-down list. Available options are:  WPA-2 Personal  WPA Personal  Both (WPA-2 & WPA)  Static WEP If you selected Static WEP, then do the following:  Select appropriate WEP key size from the WEP key size drop-down list. Available options are 64-bit and 128-bit.  Select appropriate Tx key from the Tx Key drop-down list. Available options are 1, 2, 3, and 4.  Enter an appropriate WEP key in the WEP Key text box and reconfirm. For more information on encryption and recommended encryption type, see Chapter 9, "Encryption" . 2. Enter a passphrase in the Passphrase text box and reconfirm. 3. Select the required option from the Mac authentication drop-down list. Available options are:  None-This option provides open authentication. Any client that requests association is allowed to connect to the network. Open authentication is not recommended unless you want users to gain quick access to the network.  External RADIUS Server-For information on configuring an external RADIUS server, see "Configuring an External RADIUS Server" on page 79. Select the required Mac authentication from the Mac authentication drop-down list. Available options are:  None-This option provides open authentication. Any client that requests association is allowed to connect to the network. Open authentication is not recommended unless you want users to gain quick access to the network.  External RADIUS Server-For information on configuring an external RADIUS server, see "Configuring an External RADIUS Server" on page 79. 4. Click Next. The Access tab appears. The Allow any to all destinations access rule is enabled by default. This rule allows traffic to all destinations. Instant Firewall treats packets based on the first rule matched. For more information, see Chapter 11, "Instant Firewall" . To edit the default rule, perform the following steps: a. Select the rule and click Edit. b. Select appropriate options in the Edit Rule box and click OK. To define an access rule, perform the following steps: a. Click New. b. Select appropriate options in the New Rule box. c. Click OK. 5. Click Finish. The network is added and listed in the Networks tab. Dell PowerConnect W-Series Instant Access Point 6.1.2.3-2.0.0.0 | User Guide Wireless Network | 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158

Dell PowerConnect W-Series Instant Access Point 6.1.2.3-2.0.0.0
| User Guide
Wireless Network
|
49
4.
Click
Next
. The
Access
tab appears. The
Allow any to all destinations
access rule is enabled by default. This
rule allows traffic to all destinations. Instant Firewall treats packets based on the first rule matched. For more
information, see
Chapter 11, “Instant Firewall”
.
To edit the default rule, perform the following steps:
a.
Select the rule and click
Edit
.
b.
Select appropriate options in the
Edit Rule box
and click
OK.
To define an access rule, perform the following steps:
a.
Click
New
.
b.
Select appropriate options in the
New Rule
box.
c.
Click
OK
.
5.
Click
Finish
. The network is added and listed in the
Networks
tab.
You want to use the default security level, Personal,
Perform the following steps:
1.
Select the required key options from the Key management
drop-down list. Available options are:
WPA-2 Personal
WPA Personal
Both (WPA-2 & WPA)
Static WEP
If you selected Static WEP, then do the following:
Select appropriate WEP key size from the WEP key size
drop-down list. Available options are 64-bit and 128-bit.
Select appropriate Tx key from the Tx Key drop-down list.
Available options are 1, 2, 3, and 4.
Enter an appropriate WEP key in the WEP Key text box and
reconfirm.
For more information on encryption and recommended
encryption type, see
Chapter 9, “Encryption”
.
2.
Enter a passphrase in the Passphrase text box and
reconfirm.
3.
Select the required option from the Mac authentication
drop-down list. Available options are:
None—This option provides open authentication. Any
client that requests association is allowed to connect to
the network. Open authentication is not recommended
unless you want users to gain quick access to the
network.
External RADIUS Server—For information on configuring
an external RADIUS server, see
“Configuring an External
RADIUS Server” on page 79
.
You select the Open security level
Select the required Mac authentication from the Mac
authentication drop-down list. Available options are:
None—This option provides open authentication. Any
client that requests association is allowed to connect to
the network. Open authentication is not recommended
unless you want users to gain quick access to the
network.
External RADIUS Server—For information on configuring
an external RADIUS server, see
“Configuring an External
RADIUS Server” on page 79
.
Table 8
Conditions for Adding a Voice Network—Security Tab (Continued)
If
then,