3Com Router WL-602 User Manual
Have a look at the manual 3Com Router WL-602 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 3Com manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Wireless Settings59 Or you can generate the 64-bit WEP key automatically: ■enter a memorable passphrase in the Passphrase field, and then click Generate to generate the hex keys from the passphrase. For 64-bit WEP, you can enter up to four keys, in the fields Key 1 to Key 4. The radio button on the left hand side selects the key that is used in transmitting data. Note that all four WEP keys on each device in the wireless network must be identical. 2Click Apply. 128-bit WEP WEP is the basic mechanism to transmit your data securely over the wireless network. Matching encryption keys must be set up on your Router and wireless client devices to use WEP. Note that 3Com recommends using WPA/WPA2 to secure your wireless connection. Figure 43 128-bit WEP Screen To setup 128-bit WEP: 1You can enter the 128-bit WEP key manually: ■enter your WEP key as 13 pairs of hex digits (0-9, A-F). Or you can generate the 128-bit WEP key automatically:
60CHAPTER 5: CONFIGURING THE ROUTER ■enter a memorable passphrase in the Passphrase field, and then click Generate to generate the hex keys from the passphrase. The WEP keys on each device on the wireless network must be identical. In 128-bit WEP mode, only one WEP key can be specified. 2Click Apply. WPA-PSK (no server) WPA (Wi-Fi Protected Access) provides dynamic key changes and constitutes the best security solution. If your network does not have a RADIUS server, select the no server option. For home network or very small business networking environment, PSK is typically used. Figure 44 WPA-PSK (no server) Screen 1Select WPA-PSK (no server) from the WPA drop-down menu. 2Select WPA mode from the drop-down menu, three modes are supported: WPA, WPA2, and Mixed mode. 3Select Encryption technique from the drop-down menu, four options are available: TKIP, AES, Auto for WPA, AES for WPA2, and AES for both WPA and WPA2. WPA supports TKIP and AES Encryption technique, for some old module of wireless client cards, they may only support TKIP. In this case, we suggest you to select “AUTO for WPA, AES for WPA2”. If your wireless client cards can support AES over WPA, we suggest you directly select “AES for both WPA and WPA2”. 4Enter the pre-shared key in the Pre-shared Key (PSK) field. The pre-shared key is a password, in the form of a word, phrase or series of letters and
Wireless Settings61 numbers. The key must be between 8 and 63 characters long and can include spaces and symbols. Each client that connects to the network must use the same key. 5If you want the key that you enter to be shown on the screen as a series of asterisks (*), then check the Hide PSK checkbox. 6Click Apply. WPA (with RADIUS Server) WPA (Wi-Fi Protected Access) provides dynamic key changes and constitutes the best security solution. This function requires that a RADIUS server is running on the network. Figure 45 WPA (with RADIUS Server) Screen 1Select WPA with RADIUS server from the Security Mode drop-down menu. 2Select WPA mode from the drop-down menu, three modes are supported: WPA, WPA2, and Mixed mode. 3Select Encryption technique from the drop-down menu, four options are available: TKIP, AES, Auto for WPA AES for WPA2, and AES for both WPA and WPA2. WPA supports TKIP and AES Encryption technique, for some old module of wireless client cards, they may only support TKIP. In this case, we suggest you to select “AUTO for WPA, AES for WPA2”. If your wireless client cards can support AES over WPA, we suggest you directly select “AES for both WPA and WPA2”.
62CHAPTER 5: CONFIGURING THE ROUTER 4Enter the IP address of the RADIUS server on your network into the RADIUS Server field. 5Enter the port number that the RADIUS server is operating on in the RADIUS Port field. 6Enter the key for the RADIUS server in the RADIUS Key field. 7By default, the WPA keys are changed every hour, but if you want to change this setting, you can do so by specifying the required time in the Re-key Interval field. 8Click Apply. WPSWi-Fi Protected Setup (WPS) integrate the new WLAN clients into your wireless network easily. You can enable this function by entering the PIN code via the web UI page or by pressing the WPS button on the rear side of the device. Figure 46 WPS Screen Two methods to setup the WPS, you can choose either one of the following method. Note that if you choose to use the PBC mode, it would be no need to enter the PIN code of the wireless NIC on this screen. ■PIN 1Check the Enable WPS Function box. The WPS-PIN field will appear. 2Enter the PIN code in the WPS-PIN field. And then click Apply. Please note that the PIN code is generated this way: on the client side, run the WPS utility which is provided by the vendor of your Wi-Fi card
Wireless Settings63 and select the PIN method. You should get a 8-digit PIN number from the WPS utility. Enter that 8-digit PIN number on this screen and click Apply to activate this PIN method. Then the Router starts to negotiate the security with the WLAN clients and WPS LED will start flashing. After the connection has been established successfully, the WPS LED will then be off. ■WPS-PBC 1Press the WPS button located on the rear of the Router. Note that this setup precess will only be active for 2 minutes. Follow the instruction of your WLAN NIC to set up the WPS.
64CHAPTER 5: CONFIGURING THE ROUTER Connection ControlThis feature is used to filter the clients based on their MAC addresses. Using this function, you can limit the access right of the wireless clients to this Router. Check the Enable MAC Address Filtering checkbox, the Connection Control screen will appear. Figure 47 Connection Control Screen There are two options available in the Access rule for registered MAC address field: ■if you click Allow, this means only the MAC addresses registered here in the list will be allowed to access the Router via wireless link. ■if you click Deny, this means the registered MAC addresses will not be able to access the Router via wireless link. Use the MAC Address Filtering List to quickly copy the MAC addresses of the current wireless clients into the list table. You can define up to 32 MAC addresses to the list. You can click Clear to delete the current entry in the list.
Wireless Settings65 Client ListYou can view the list of all wireless clients that are connected to the Router. Figure 48 Client List Screen Click Refresh to update the list. WMMWireless Multimedia (WMM) mode, which supports devices that meet the 801.11e QBSS standard. WMM uses traffic priority based on the four ACs; Voice, Video, Best Effort, and Background. The higher the AC priority, the higher the probability that data is transmitted. Check the Enable WMM Function box, the WMM parameters table will appear. Figure 49 WMM Screen
66CHAPTER 5: CONFIGURING THE ROUTER Access Categories – WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags. The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies. While the four ACs are specified for specific types of traffic, WMM allows the priority levels to be configured to match any network-wide QoS policy. WMM also specifies a protocol that access points can use to communicate the configured traffic priority levels to QoS-enabled wireless clients. The following table explains the four access categories: AIFS (Arbitration Inter-Frame Space) – The minimum amount of wait time before the next data transmission attempt. Specify the AIFS value in the range 0-15 microseconds. CWMax (Maximum Contention Window) – The maximum upper limit of the random backoff wait time before wireless medium access can be attempted. The contention window is doubled after each detected collision up to the CWMax value. Specify the CWMax value in the range 0-15 microseconds. Note that the CWMax value must be greater or equal to the CWMin value. Access CategoryWMM DesignationDescription802.1D Tags AC_BE (AC0)Best EffortNormal priority, medium delay and throughput. Data only affected by long delays. Data from applications or devices that lack QoS capabilities.0, 3 AC_BK (AC1)BackgroundLowest priority. Data with no delay or throughput requirements, such as bulk data transfers.2, 1 AC_VI (AC2)VideoHigh priority, minimum delay. Time-sensitive data such as streaming video.5, 4 AC_VO (AC3)VoiceHighest priority, minimum delay. Time-sensitive data such as VoIP (Voice over IP) calls.7, 6
Wireless Settings67 CWMin (Minimum Contention Window) – The initial upper limit of the random backoff wait time before wireless medium access can be attempted. The initial wait time is a random value between zero and the CWMin value. Specify the CWMin value in the range 0-15 microseconds. Note that the CWMin value must be equal or less than the CWMax value. TXOP Limit (Transmit Opportunity Limit) – The maximum time an AC transmit queue has access to the wireless medium. When an AC queue is granted a transmit opportunity, it can transmit data for a time up to the TxOpLimit. This data bursting greatly improves the efficiency for high data-rate traffic. Specify a value in the range 0-65535 microseconds. ACM – Admission Control Mode, for the access category. When enabled, clients are blocked from using the access category. (Default: Disabled) Ack Policy (WMM Acknowledge Policy) – By default, all wireless data transmissions require the sender to wait for an acknowledgement from the receiver. WMM allows the acknowledgement wait time to be turned off for each Access Category (AC). Although this increases data throughput, it can also result in a high number of errors when traffic levels are heavy. (Default: Acknowledge)
68CHAPTER 5: CONFIGURING THE ROUTER WDSThe Router supports WDS (Wireless Distribution System). WDS enables one or more Access Points to rebroadcast received signals to extend range and reach, though this can affect the overall throughput of data. Note that WDS implementation can vary from product to product. Hence there is no guarantee that different products will interoperate. In addition, the security settings for WDS links should be the same as the one setup for your wireless clients. Figure 50 Wireless WDS Settings Screen 1Check the Enable WDS Function checkbox. 2To refresh the list of available access points, click Rescan Wireless Networking. If the MAC address of the desired APs is in the list of scanned APs, you can simply check those APs to add them to the WDS. 3Click Add to add the MAC address of the AP to the list (up to 4 APs can be added), the add WDS screen will appear (refer to Figure 51).