Netgear WG103 WG103 Reference Manual - Page 39

Security Profiles, WPA, WPA-PSK, or WPA2-PSK, WPA with RADIUS WPA-802.1x, or WPA - repeater

Page 39 highlights

WG103 ProSafe 802.11g Wireless Access Point Reference Manual • WPA, WPA-PSK, WPA2, or WPA2-PSK. Wi-Fi Protected Access (WPA and WPA2) data encryption provides data security. The very strong authentication along with dynamic per frame rekeying of WPA make it virtually impossible to compromise. For information about how to configure WEP, see "Configuring WPA" on page 3-12. • WPA with RADIUS (WPA-802.1x), WPA2 with RADIUS (WPA2-802.1x), or WPA and WPA2 with RADIUS (WPA-802.1x+WPA2-802.1x). Wi-Fi Protected Access (WPA and WPA2) data encryption provides data security. The very strong authentication along with dynamic per frame rekeying of WPA make it virtually impossible to compromise. For information about how to configure WEP, see "Configuring WPA" on page 3-12. Security Profiles Security profiles let you configure unique security settings for each SSID. The wireless access point supports up to eight BSSIDs that you can configure in the Profile Settings screen (see "Creating and Editing Security Profiles" on page 3-5). To set up a security profile you select its network authentication type, data encryption, wireless client security separation, and VLAN ID: • Network Authentication The wireless access point is set by default as an open system with no authentication. When you configure network authentication, bear in mind the following: - If you are using Access Point mode, then all options are available. In other modes such as Repeater or Bridge, some options may be unavailable. - Not all wireless adapters support WPA or WPA2. Windows XP, Windows 2000 with Service Pack 3, and Windows Vista do include the client software that supports WPA. However, client software is required on the client. Consult the product documentation for your wireless adapter and WPA or WPA2 client software for instructions on configuring WPA2 settings. You can configure the wireless access point to use the types of network authentication that are shown in Table 3-1 on page 3-7. • Data Encryption Select the data encryption that you want to use. The available options depend on the network authentication setting above (otherwise, the default is None). The Data Encryption settings are explained in Table 3-2 on page 3-8. Wireless Security 3-3 v1.0, February 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

WG103 ProSafe 802.11g Wireless Access Point Reference Manual
Wireless Security
3-3
v1.0, February 2009
WPA, WPA-PSK, WPA2, or WPA2-PSK
. Wi-Fi Protected Access (WPA and WPA2) data
encryption provides data security. The very strong authentication along with dynamic per
frame rekeying of WPA make it virtually impossible to compromise. For information about
how to configure WEP, see
“Configuring WPA” on page 3-12
.
WPA with RADIUS (WPA-802.1x)
,
WPA2 with RADIUS (WPA2-802.1x)
,
or WPA and
WPA2 with RADIUS (WPA-802.1x+WPA2-802.1x)
. Wi-Fi Protected Access (WPA and
WPA2) data encryption provides data security. The very strong authentication along with
dynamic per frame rekeying of WPA make it virtually impossible to compromise. For
information about how to configure WEP, see
“Configuring WPA” on page 3-12
.
Security Profiles
Security profiles let you configure unique security settings for each SSID. The wireless access
point supports up to eight BSSIDs that you can configure in the Profile Settings screen (see
“Creating and Editing Security Profiles” on page 3-5
). To set up a security profile you select its
network authentication type, data encryption, wireless client security separation, and VLAN ID:
Network Authentication
The wireless access point is set by default as an open system with no authentication. When you
configure network authentication, bear in mind the following:
If you are using Access Point mode, then all options are available. In other modes such as
Repeater or Bridge, some options may be unavailable.
Not all wireless adapters support WPA or WPA2. Windows XP, Windows 2000 with
Service Pack 3, and Windows Vista do include the client software that supports WPA.
However, client software is required on the client. Consult the product documentation for
your wireless adapter and WPA or WPA2 client software for instructions on configuring
WPA2 settings.
You can configure the wireless access point to use the types of network authentication that are
shown in
Table 3-1 on page 3-7
.
Data Encryption
Select the data encryption that you want to use. The available options depend on the network
authentication setting above (otherwise, the default is None). The Data Encryption settings are
explained in
Table 3-2 on page 3-8
.