Home > Edimax > Router > Edimax Router BR-6315SRg User Manual

Edimax Router BR-6315SRg User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Edimax Router BR-6315SRg User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    50 
    2.4.3 Security 
    This Router provides complete wireless LAN security functions, include WEP, 
    IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key and WPA 
    with RADIUS. With these security functions, you can prevent your wireless 
    LAN from illegal access. Please make sure your wireless stations use the 
    same security function. 
     
    2.4.3.1 WEP only 
    When you select 64-bit or128-bit WEP key, you have to enter WEP keys to 
    encrypt data. You can generate the key by yourself and enter it. You can enter 
    four WEP keys and select one of them as default key. Then the router can 
    receive any packets encrypted by one of the four keys. 
     
     
     
    Parameters  Default Description 
    Key Length  
    64-bit You can select the WEP key length for 
    encryption, 64-bit or 128-bit. Larger WEP key 
    length will provide higher level of security, but 
    the data throughput will be lowered. 
    Key Format   You can select ASCII Characters (alphanumeric 
    format) or Hexadecimal Digits (A-F, a-f and  
    						
    							 
    51 
    0-9) to be the WEP Key. 
    For example: ASCII Characters: guest 
    Hexadecimal Digits: 12345abcde 
    Default Key   Select one of the four keys to encrypt your 
    data. Only the key you select it in the Default 
    key will be used. 
    Key 1 - Key 
    4   The WEP keys are used to encrypt data 
    transmitted over the wireless network. Fill the 
    text box by following the rules: 64-bit WEP: 
    input 10-digit Hex values (in the A-F, a-f and 
    0-9 range) or 5-digit ASCII character as the 
    encryption keys. 
    128-bit WEP: input 26-digit Hex values (A-F, 
    a-f and 0-9) or 13-digit ASCII characters as 
    the encryption keys. 
     
    Click  at the bottom of the screen to save the configurations. You can 
    now configure other advance sections or start using the router. 
      
    						
    							 
    52 
    2.4.3.2 802.1x only 
    IEEE 802.1x is an authentication protocol. Every user must use a valid 
    account to login to this Access Point before accessing the wireless LAN. The 
    authentication is processed by a RADIUS server. This mode only 
    authenticates user by IEEE 802.1x, but it does not encryption the data during 
    communication. 
     
     
    Parameters  Description 
    RADIUS Server 
    IP address The IP address of external RADIUS server. 
    RADIUS Server 
    Port The service port of the external RADIUS server. 
    RADIUS Server 
    Password The password used by external RADIUS server. 
     
    Click  at the bottom of the screen to save the configurations. You can 
    now configure other advance sections or start using the router. 
      
    						
    							 
    53 
    2.4.3.3 802.1x WEP Static key 
    IEEE 802.1x is an authentication protocol. Every user must use a valid 
    account to login to this Access Point before accessing the wireless LAN. The 
    authentication is processed by a RADIUS server. This mode also uses WEP to 
    encrypt the data during communication. 
     
    For detailed instructions of WEP settings, please refer to section 2.4.3.1 “WEP 
    only”. For the 802.1x settings, please refer to section 2.4.3.2 “802.1x only”. 
      
    						
    							 
    54 
    2.4.3.4 WPA Pre-shared key 
    Wi-Fi Protected Access (WPA) is an advanced security standard. You can use 
    a pre-shared key to authenticate wireless stations and encrypt data during 
    communication. It uses TKIP or CCMP (AES) to change the encryption key 
    frequently. So the encryption key will not be known by hackers easily, and this 
    will improve security. 
     
     
     
    Parameters  Description 
    WPA(TKIP) TKIP will change the encryption key frequently to enhance 
    the wireless LAN security. 
    WPA2(AES) WPA2 AES uses CCMP protocol to change encryption key 
    frequently. AES can provide high level encryption to enhance 
    the wireless LAN security. 
    WPA2 Mixed WPA2 Mixed will use TKIP or AES based on the other 
    communication peer automatically. 
    Pre-shared 
    Key Format You may select Passphrase (alphanumeric format) or 
    Hexadecimal Digits (in the “A-F”, “a-f” and “0-9” range) to be 
    the Pre-shared Key. For example:   
    Passphrase: iamguest  
    						
    							 
    55 
    Hexadecimal Digits: 12345abcde 
    Pre-shared 
    Key The Pre-shared key is used to authenticate and encrypt data 
    transmitted over the wireless network. Fill the text box by 
    following the rules listed here:   Hex WEP: input 64-digit Hex 
    values (“A-F”, “a-f” and “0-9”) or at least 8 character pass 
    phrase as the pre-shared keys. 
     
    Click  at the bottom of the screen to save the configurations. You can 
    now configure other advance sections or start using the router. 
     
     
      
    						
    							 
    56 
    2.4.3.5 WPA Radius 
    Wi-Fi Protected Access (WPA) is an advanced security standard. You can use 
    an external RADIUS server to authenticate wireless stations and provide the 
    session key to encrypt data during communication. It uses TKIP or CCMP 
    (AES) to change the encryption key frequently, and this will improve security. 
     
     
    Parameters   Description 
    WPA(TKIP) TKIP will change the encryption key frequently to enhance 
    the wireless LAN security. 
    WPA2(AES) WPA2 AES uses CCMP protocol to change encryption key 
    frequently. AES can provide high level encryption to 
    enhance the wireless LAN security. 
    WPA2 Mixed WPA2 MIXED will use TKIP or AES based on the other 
    communication peer automatically. 
    RADIUS Server 
    IP address The IP address of external RADIUS server. 
    RADIUS Server 
    Port The service port of the external RADIUS server. 
    RADIUS Server 
    Password The password used by external RADIUS server. 
      
    						
    							 
    57 
    Click  at the bottom of the screen to save the configurations. You can 
    now configure other advance sections or start using the router. 
     
    2.4.4 Access Control 
    This wireless router provides MAC Address Control, which prevents 
    unauthorized MAC Addresses from accessing your wireless network. 
     
     
     
    Parameters   Description 
    Enable wireless 
    access control Enable wireless access control 
    Add MAC 
    address into the 
    list Fill in the MAC Address and Comment of the wireless 
    station to be added and then click Add. Then this wireless 
    station will be added into the Current Access Control List 
    below. If you find any issues before adding it and want to 
    correct it. Just click Clear and both MAC Address and 
    Comment fields will be cleared. 
    Remove MAC 
    address from list If you want to remove some MAC address from the Current 
    Access Control List , select the MAC addresses you want 
    to remove in the list and then click Delete Selected. If you 
    want remove all MAC addresses from the table, click 
    Delete All button. Click Reset will clear your current  
    						
    							 
    58 
    selections. 
     
    Click  at the bottom of the screen to save the configurations. You can 
    now configure other advance sections or start using the router. 
      
    						
    							 
    59 
    2.5 QoS 
    The QoS function can classify Internet application traffic by source/destination 
    IP address and port number. You can assign priority for each type of 
    application and reserve bandwidth for it. The packets of applications with 
    higher priority will always go first. Lower priority applications will get bandwidth 
    after higher priority applications get enough bandwidth. This can let you have a 
    better experience in using delay-sensitive services like Internet phone, video 
    conference …etc. All the applications not specified by you are classified as 
    rule name “Others”. The rule with smaller priority number has higher priority; 
    the rule with larger priority number has lower priority. You can adjust the  
    priority of the rules by moving them up or down.   
     
    Note: If the total assigned bandwidth of higher priority applications is larger 
    than the maximum bandwidth provided by the WAN port, then other 
    applications will not get any bandwidth. 
     
      
    						
    All Edimax manuals Comments (0)

    Related Manuals for Edimax Router BR-6315SRg User Manual