Home > 3Com > Router > 3Com Router WL-602 User Manual

3Com Router WL-602 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual 3Com Router WL-602 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 3Com manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Wireless Settings59
    Or you can generate the 64-bit WEP key automatically: 
    ■enter a memorable passphrase in the Passphrase field, and then 
    click Generate to generate the hex keys from the passphrase.
    For 64-bit WEP, you can enter up to four keys, in the fields Key 1 to Key 4. 
    The radio button on the left hand side selects the key that is used in 
    transmitting data.
    Note that all four WEP keys on each device in the wireless network must 
    be identical.
    2Click Apply.
    128-bit WEP
    WEP is the basic mechanism to transmit your data securely over the 
    wireless network. Matching encryption keys must be set up on your 
    Router and wireless client devices to use WEP. Note that 3Com 
    recommends using WPA/WPA2 to secure your wireless connection.
    Figure 43   128-bit WEP Screen
    To setup 128-bit WEP: 
    1You can enter the 128-bit WEP key manually:
    ■enter your WEP key as 13 pairs of hex digits (0-9, A-F).
    Or you can generate the 128-bit WEP key automatically:  
    						
    							60CHAPTER 5: CONFIGURING THE ROUTER
    ■enter a memorable passphrase in the Passphrase field, and then 
    click Generate to generate the hex keys from the passphrase.
    The WEP keys on each device on the wireless network must be identical. 
    In 128-bit WEP mode, only one WEP key can be specified.
    2Click Apply.
    WPA-PSK (no server)
    WPA (Wi-Fi Protected Access) provides dynamic key changes and 
    constitutes the best security solution. If your network does not have a 
    RADIUS server, select the no server option. For home network or very 
    small business networking environment, PSK is typically used. 
    Figure 44   WPA-PSK (no server) Screen 
    1Select WPA-PSK (no server) from the WPA drop-down menu.
    2Select WPA mode from the drop-down menu, three modes are 
    supported: WPA, WPA2, and Mixed mode.
    3Select Encryption technique from the drop-down menu, four options are 
    available: TKIP, AES, Auto for WPA, AES for WPA2, and AES for both WPA 
    and WPA2.
    WPA supports TKIP and AES Encryption technique, for some old module 
    of wireless client cards, they may only support TKIP. In this case, we 
    suggest you to select “AUTO for WPA, AES for WPA2”. If your wireless 
    client cards can support AES over WPA, we suggest you directly select 
    “AES for both WPA and WPA2”.
    4Enter the pre-shared key in the Pre-shared Key (PSK) field. The pre-shared 
    key is a password, in the form of a word, phrase or series of letters and  
    						
    							Wireless Settings61
    numbers. The key must be between 8 and 63 characters long and can 
    include spaces and symbols. Each client that connects to the network 
    must use the same key.
    5If you want the key that you enter to be shown on the screen as a series 
    of asterisks (*), then check the Hide PSK checkbox. 
    6Click Apply.
    WPA (with RADIUS Server)
    WPA (Wi-Fi Protected Access) provides dynamic key changes and 
    constitutes the best security solution. This function requires that a 
    RADIUS server is running on the network.
    Figure 45   WPA (with RADIUS Server) Screen
    1Select WPA with RADIUS server from the Security Mode drop-down 
    menu.
    2Select WPA mode from the drop-down menu, three modes are 
    supported: WPA, WPA2, and Mixed mode.
    3Select Encryption technique from the drop-down menu, four options are 
    available: TKIP, AES, Auto for WPA AES for WPA2, and AES for both WPA 
    and WPA2. 
    WPA supports TKIP and AES Encryption technique, for some old module 
    of wireless client cards, they may only support TKIP. In this case, we 
    suggest you to select “AUTO for WPA, AES for WPA2”. If your wireless 
    client cards can support AES over WPA, we suggest you directly select 
    “AES for both WPA and WPA2”. 
    						
    							62CHAPTER 5: CONFIGURING THE ROUTER
    4Enter the IP address of the RADIUS server on your network into the 
    RADIUS Server field.
    5Enter the port number that the RADIUS server is operating on in the 
    RADIUS Port field.
    6Enter the key for the RADIUS server in the RADIUS Key field.
    7By default, the WPA keys are changed every hour, but if you want to 
    change this setting, you can do so by specifying the required time in the 
    Re-key Interval field. 
    8Click Apply.
    WPSWi-Fi Protected Setup (WPS) integrate the new WLAN clients into your 
    wireless network easily. You can enable this function by entering the PIN 
    code via the web UI page or by pressing the WPS button on the rear side 
    of the device. 
    Figure 46   WPS Screen
    Two methods to setup the WPS, you can choose either one of the 
    following method. Note that if you choose to use the PBC mode, it would 
    be no need to enter the PIN code of the wireless NIC on this screen. 
    ■PIN
    1Check the Enable WPS Function box. The WPS-PIN field will appear. 
    2Enter the PIN code in the WPS-PIN field. And then click Apply. 
    Please note that the PIN code is generated this way: on the client side, 
    run the WPS utility which is provided by the vendor of your Wi-Fi card  
    						
    							Wireless Settings63
    and select the PIN method. You should get a 8-digit PIN number from the 
    WPS utility. 
    Enter that 8-digit PIN number on this screen and click Apply to activate 
    this PIN method. Then the Router starts to negotiate the security with the 
    WLAN clients and WPS LED will start flashing. After the connection has 
    been established successfully, the WPS LED will then be off. 
    ■WPS-PBC
    1Press the WPS button located on the rear of the Router. Note that this 
    setup precess will only be active for 2 minutes. Follow the instruction of 
    your WLAN NIC to set up the WPS.  
    						
    							64CHAPTER 5: CONFIGURING THE ROUTER
    Connection ControlThis feature is used to filter the clients based on their MAC addresses. 
    Using this function, you can limit the access right of the wireless clients to 
    this Router. 
    Check the Enable MAC Address Filtering checkbox, the Connection 
    Control screen will appear. 
    Figure 47   Connection Control Screen
    There are two options available in the Access rule for registered MAC 
    address field: 
    ■if you click Allow, this means only the MAC addresses registered here 
    in the list will be allowed to access the Router via wireless link.
    ■if you click Deny, this means the registered MAC addresses will not be 
    able to access the Router via wireless link.
    Use the MAC Address Filtering List to quickly copy the MAC addresses of 
    the current wireless clients into the list table. You can define up to 32 
    MAC addresses to the list. 
    You can click Clear to delete the current entry in the list.  
    						
    							Wireless Settings65
    Client ListYou can view the list of all wireless clients that are connected to the 
    Router. 
    Figure 48   Client List Screen
    Click Refresh to update the list.
    WMMWireless Multimedia (WMM) mode, which supports devices that meet the 
    801.11e QBSS standard. WMM uses traffic priority based on the four 
    ACs; Voice, Video, Best Effort, and Background. The higher the AC 
    priority, the higher the probability that data is transmitted.
    Check the Enable WMM Function box, the WMM parameters table will 
    appear. 
    Figure 49   WMM Screen  
    						
    							66CHAPTER 5: CONFIGURING THE ROUTER
    Access Categories – WMM defines four access categories (ACs): voice, 
    video, best effort, and background. These categories correspond to traffic 
    priority levels and are mapped to IEEE 802.1D priority tags. The direct 
    mapping of the four ACs to 802.1D priorities is specifically intended to 
    facilitate inter operability with other wired network QoS policies. While 
    the four ACs are specified for specific types of traffic, WMM allows the 
    priority levels to be configured to match any network-wide QoS policy. 
    WMM also specifies a protocol that access points can use to 
    communicate the configured traffic priority levels to QoS-enabled 
    wireless clients.
    The following table explains the four access categories: 
    AIFS (Arbitration Inter-Frame Space) – The minimum amount of wait time 
    before the next data transmission attempt. Specify the AIFS value in the 
    range 0-15 microseconds.
    CWMax (Maximum Contention Window) – The maximum upper limit of 
    the random backoff wait time before wireless medium access can be 
    attempted. The contention window is doubled after each detected 
    collision up to the CWMax value. Specify the CWMax value in the range 
    0-15 microseconds. Note that the CWMax value must be greater or equal 
    to the CWMin value.
    Access CategoryWMM 
    DesignationDescription802.1D 
    Tags
    AC_BE (AC0)Best EffortNormal priority, medium 
    delay and throughput. Data 
    only affected by long delays. 
    Data from applications or 
    devices that lack QoS 
    capabilities.0, 3
    AC_BK (AC1)BackgroundLowest priority. Data with no 
    delay or throughput 
    requirements, such as bulk 
    data transfers.2, 1
    AC_VI (AC2)VideoHigh priority, minimum 
    delay. Time-sensitive data 
    such as streaming video.5, 4
    AC_VO (AC3)VoiceHighest priority, minimum 
    delay. Time-sensitive data 
    such as VoIP (Voice over IP) 
    calls.7, 6 
    						
    							Wireless Settings67
    CWMin (Minimum Contention Window) – The initial upper limit of the 
    random backoff wait time before wireless medium access can be 
    attempted. The initial wait time is a random value between zero and the 
    CWMin value. Specify the CWMin value in the range 0-15 microseconds. 
    Note that the CWMin value must be equal or less than the CWMax value.
    TXOP Limit (Transmit Opportunity Limit) – The maximum time an AC 
    transmit queue has access to the wireless medium. When an AC queue is 
    granted a transmit opportunity, it can transmit data for a time up to the 
    TxOpLimit. This data bursting greatly improves the efficiency for high 
    data-rate traffic. Specify a value in the range 0-65535 microseconds.
    ACM – Admission Control Mode, for the access category. When enabled, 
    clients are blocked from using the access category. (Default: Disabled)
    Ack Policy (WMM Acknowledge Policy) – By default, all wireless data 
    transmissions require the sender to wait for an acknowledgement from 
    the receiver. WMM allows the acknowledgement wait time to be turned 
    off for each Access Category (AC). Although this increases data 
    throughput, it can also result in a high number of errors when traffic 
    levels are heavy. (Default: Acknowledge) 
    						
    							68CHAPTER 5: CONFIGURING THE ROUTER
    WDSThe Router supports WDS (Wireless Distribution System). WDS enables 
    one or more Access Points to rebroadcast received signals to extend 
    range and reach, though this can affect the overall throughput of data.
    Note that WDS implementation can vary from product to product. Hence 
    there is no guarantee that different products will interoperate. In 
    addition, the security settings for WDS links should be the same as the 
    one setup for your wireless clients.
    Figure 50   Wireless WDS Settings Screen
    1Check the Enable WDS Function checkbox.
    2To refresh the list of available access points, click Rescan Wireless 
    Networking. If the MAC address of the desired APs is in the list of 
    scanned APs, you can simply check those APs to add them to the WDS. 
    3Click Add to add the MAC address of the AP to the list (up to 4 APs can 
    be added), the add WDS screen will appear (refer to Figure 51).  
    						
    All 3Com manuals Comments (0)