3Com Router WL-602 User Manual
Here you can view all the pages of manual 3Com Router WL-602 User Manual. The 3Com manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 61
Wireless Settings59 Or you can generate the 64-bit WEP key automatically: ■enter a memorable passphrase in the Passphrase field, and then click Generate to generate the hex keys from the passphrase. For 64-bit WEP, you can enter up to four keys, in the fields Key 1 to Key 4. The radio button on the left hand side selects the key that is used in transmitting data. Note that all four WEP keys on each device in the wireless network must be identical. 2Click Apply. 128-bit WEP WEP is the basic mechanism...
Page 62
60CHAPTER 5: CONFIGURING THE ROUTER ■enter a memorable passphrase in the Passphrase field, and then click Generate to generate the hex keys from the passphrase. The WEP keys on each device on the wireless network must be identical. In 128-bit WEP mode, only one WEP key can be specified. 2Click Apply. WPA-PSK (no server) WPA (Wi-Fi Protected Access) provides dynamic key changes and constitutes the best security solution. If your network does not have a RADIUS server, select the no server option. For...
Page 63
Wireless Settings61 numbers. The key must be between 8 and 63 characters long and can include spaces and symbols. Each client that connects to the network must use the same key. 5If you want the key that you enter to be shown on the screen as a series of asterisks (*), then check the Hide PSK checkbox. 6Click Apply. WPA (with RADIUS Server) WPA (Wi-Fi Protected Access) provides dynamic key changes and constitutes the best security solution. This function requires that a RADIUS server is running on...
Page 64
62CHAPTER 5: CONFIGURING THE ROUTER 4Enter the IP address of the RADIUS server on your network into the RADIUS Server field. 5Enter the port number that the RADIUS server is operating on in the RADIUS Port field. 6Enter the key for the RADIUS server in the RADIUS Key field. 7By default, the WPA keys are changed every hour, but if you want to change this setting, you can do so by specifying the required time in the Re-key Interval field. 8Click Apply. WPSWi-Fi Protected Setup (WPS) integrate the new...
Page 65
Wireless Settings63 and select the PIN method. You should get a 8-digit PIN number from the WPS utility. Enter that 8-digit PIN number on this screen and click Apply to activate this PIN method. Then the Router starts to negotiate the security with the WLAN clients and WPS LED will start flashing. After the connection has been established successfully, the WPS LED will then be off. ■WPS-PBC 1Press the WPS button located on the rear of the Router. Note that this setup precess will only be active...
Page 66
64CHAPTER 5: CONFIGURING THE ROUTER Connection ControlThis feature is used to filter the clients based on their MAC addresses. Using this function, you can limit the access right of the wireless clients to this Router. Check the Enable MAC Address Filtering checkbox, the Connection Control screen will appear. Figure 47 Connection Control Screen There are two options available in the Access rule for registered MAC address field: ■if you click Allow, this means only the MAC addresses registered...
Page 67
Wireless Settings65 Client ListYou can view the list of all wireless clients that are connected to the Router. Figure 48 Client List Screen Click Refresh to update the list. WMMWireless Multimedia (WMM) mode, which supports devices that meet the 801.11e QBSS standard. WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. Check the Enable WMM Function box, the WMM parameters table...
Page 68
66CHAPTER 5: CONFIGURING THE ROUTER Access Categories – WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags. The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WMM allows the priority levels to be...
Page 69
Wireless Settings67 CWMin (Minimum Contention Window) – The initial upper limit of the random backoff wait time before wireless medium access can be attempted. The initial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 microseconds. Note that the CWMin value must be equal or less than the CWMax value. TXOP Limit (Transmit Opportunity Limit) – The maximum time an AC transmit queue has access to the wireless medium. When an AC queue is granted...
Page 70
68CHAPTER 5: CONFIGURING THE ROUTER WDSThe Router supports WDS (Wireless Distribution System). WDS enables one or more Access Points to rebroadcast received signals to extend range and reach, though this can affect the overall throughput of data. Note that WDS implementation can vary from product to product. Hence there is no guarantee that different products will interoperate. In addition, the security settings for WDS links should be the same as the one setup for your wireless clients. Figure 50...