Edimax Router BR-6315SRg User Manual
Have a look at the manual Edimax Router BR-6315SRg User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
50 2.4.3 Security This Router provides complete wireless LAN security functions, include WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function. 2.4.3.1 WEP only When you select 64-bit or128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by yourself and enter it. You can enter four WEP keys and select one of them as default key. Then the router can receive any packets encrypted by one of the four keys. Parameters Default Description Key Length 64-bit You can select the WEP key length for encryption, 64-bit or 128-bit. Larger WEP key length will provide higher level of security, but the data throughput will be lowered. Key Format You can select ASCII Characters (alphanumeric format) or Hexadecimal Digits (A-F, a-f and
51 0-9) to be the WEP Key. For example: ASCII Characters: guest Hexadecimal Digits: 12345abcde Default Key Select one of the four keys to encrypt your data. Only the key you select it in the Default key will be used. Key 1 - Key 4 The WEP keys are used to encrypt data transmitted over the wireless network. Fill the text box by following the rules: 64-bit WEP: input 10-digit Hex values (in the A-F, a-f and 0-9 range) or 5-digit ASCII character as the encryption keys. 128-bit WEP: input 26-digit Hex values (A-F, a-f and 0-9) or 13-digit ASCII characters as the encryption keys. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
52 2.4.3.2 802.1x only IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates user by IEEE 802.1x, but it does not encryption the data during communication. Parameters Description RADIUS Server IP address The IP address of external RADIUS server. RADIUS Server Port The service port of the external RADIUS server. RADIUS Server Password The password used by external RADIUS server. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
53 2.4.3.3 802.1x WEP Static key IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode also uses WEP to encrypt the data during communication. For detailed instructions of WEP settings, please refer to section 2.4.3.1 “WEP only”. For the 802.1x settings, please refer to section 2.4.3.2 “802.1x only”.
54 2.4.3.4 WPA Pre-shared key Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless stations and encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. So the encryption key will not be known by hackers easily, and this will improve security. Parameters Description WPA(TKIP) TKIP will change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) WPA2 AES uses CCMP protocol to change encryption key frequently. AES can provide high level encryption to enhance the wireless LAN security. WPA2 Mixed WPA2 Mixed will use TKIP or AES based on the other communication peer automatically. Pre-shared Key Format You may select Passphrase (alphanumeric format) or Hexadecimal Digits (in the “A-F”, “a-f” and “0-9” range) to be the Pre-shared Key. For example: Passphrase: iamguest
55 Hexadecimal Digits: 12345abcde Pre-shared Key The Pre-shared key is used to authenticate and encrypt data transmitted over the wireless network. Fill the text box by following the rules listed here: Hex WEP: input 64-digit Hex values (“A-F”, “a-f” and “0-9”) or at least 8 character pass phrase as the pre-shared keys. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
56 2.4.3.5 WPA Radius Wi-Fi Protected Access (WPA) is an advanced security standard. You can use an external RADIUS server to authenticate wireless stations and provide the session key to encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently, and this will improve security. Parameters Description WPA(TKIP) TKIP will change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) WPA2 AES uses CCMP protocol to change encryption key frequently. AES can provide high level encryption to enhance the wireless LAN security. WPA2 Mixed WPA2 MIXED will use TKIP or AES based on the other communication peer automatically. RADIUS Server IP address The IP address of external RADIUS server. RADIUS Server Port The service port of the external RADIUS server. RADIUS Server Password The password used by external RADIUS server.
57 Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router. 2.4.4 Access Control This wireless router provides MAC Address Control, which prevents unauthorized MAC Addresses from accessing your wireless network. Parameters Description Enable wireless access control Enable wireless access control Add MAC address into the list Fill in the MAC Address and Comment of the wireless station to be added and then click Add. Then this wireless station will be added into the Current Access Control List below. If you find any issues before adding it and want to correct it. Just click Clear and both MAC Address and Comment fields will be cleared. Remove MAC address from list If you want to remove some MAC address from the Current Access Control List , select the MAC addresses you want to remove in the list and then click Delete Selected. If you want remove all MAC addresses from the table, click Delete All button. Click Reset will clear your current
58 selections. Click at the bottom of the screen to save the configurations. You can now configure other advance sections or start using the router.
59 2.5 QoS The QoS function can classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth. This can let you have a better experience in using delay-sensitive services like Internet phone, video conference …etc. All the applications not specified by you are classified as rule name “Others”. The rule with smaller priority number has higher priority; the rule with larger priority number has lower priority. You can adjust the priority of the rules by moving them up or down. Note: If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the WAN port, then other applications will not get any bandwidth.