Edimax Router BR-6315SRg User Manual
Here you can view all the pages of manual Edimax Router BR-6315SRg User Manual. The Edimax manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
50 2.4.3 Security This Router provides complete wireless LAN security functions, include WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function. 2.4.3.1 WEP only When you select 64-bit or128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by yourself and enter it. You can...
Page 52
51 0-9) to be the WEP Key. For example: ASCII Characters: guest Hexadecimal Digits: 12345abcde Default Key Select one of the four keys to encrypt your data. Only the key you select it in the Default key will be used. Key 1 - Key 4 The WEP keys are used to encrypt data transmitted over the wireless network. Fill the text box by following the rules: 64-bit WEP: input 10-digit Hex values (in the A-F, a-f and 0-9 range) or 5-digit ASCII character as the encryption keys. 128-bit WEP: input...
Page 53
52 2.4.3.2 802.1x only IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates user by IEEE 802.1x, but it does not encryption the data during communication. Parameters Description RADIUS Server IP address The IP address of external RADIUS server. RADIUS Server Port The service port of the external RADIUS server. RADIUS...
Page 54
53 2.4.3.3 802.1x WEP Static key IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode also uses WEP to encrypt the data during communication. For detailed instructions of WEP settings, please refer to section 2.4.3.1 “WEP only”. For the 802.1x settings, please refer to section 2.4.3.2 “802.1x only”.
Page 55
54 2.4.3.4 WPA Pre-shared key Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless stations and encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. So the encryption key will not be known by hackers easily, and this will improve security. Parameters Description WPA(TKIP) TKIP will change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) WPA2 AES...
Page 56
55 Hexadecimal Digits: 12345abcde Pre-shared Key The Pre-shared key is used to authenticate and encrypt data transmitted over the wireless network. Fill the text box by following the rules listed here: Hex WEP: input 64-digit Hex values (“A-F”, “a-f” and “0-9”) or at least 8 character pass phrase as the pre-shared keys. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
Page 57
56 2.4.3.5 WPA Radius Wi-Fi Protected Access (WPA) is an advanced security standard. You can use an external RADIUS server to authenticate wireless stations and provide the session key to encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently, and this will improve security. Parameters Description WPA(TKIP) TKIP will change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) WPA2 AES uses CCMP protocol to change...
Page 58
57 Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router. 2.4.4 Access Control This wireless router provides MAC Address Control, which prevents unauthorized MAC Addresses from accessing your wireless network. Parameters Description Enable wireless access control Enable wireless access control Add MAC address into the list Fill in the MAC Address and Comment of the wireless station to be added and then...
Page 59
58 selections. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
Page 60
59 2.5 QoS The QoS function can classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth. This can let you have a better experience in using delay-sensitive services like Internet phone, video conference …etc....