![3Com OfficeConnect WX1200 Reference Manual Download Page 263](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_reference-manual_441107263.webp)
Viewing and Configuring Wireless Services
263
5
Select the encryption algorithms to use:
AES (CCMP)—Usually used with RSN (WPA2)
TKIP—Usually used with WPA
WEP-104—Used with dynamic WEP
WEP-40—Used with dynamic WEP
6
Click
Next
.
7
If you selected Static WEP, specify WEP keys.
For each key (up to four), type the key value in the corresponding key
box.
By default, data in unicast and multicast packets are encrypted using
WEP key 1. To use another key for either type of packet, select the key
number in the WEP Unicast Key Index or WEP Multicast Key Index box.
8
Click
Next
.
9
If the access type is Web Portal or Open Access, select the VLAN into
which you want the switch to place users of the SSID.
If you want to specify the VLAN later when configuring the access rules,
you can leave the VLAN Name box blank.
10
Click
Next
.
If the access type is Web Portal, the ACEs (ACL rules) that 3WXM will
configure for the Web-Portal service are listed. The ACEs are required to
allow DHCP traffic while blocking all other traffic while a user is being
authenticated. These ACEs are used only during authentication. After the
user is authenticated, the ACEs are not used.
If you need to add ACEs, continue with this step. Otherwise, click
Next
and go to “Modifying Access Rules” on page 264 or click
Finish
to save
the changes and close the wizard.
To add an ACE, click
Add Rule
. 3WXM adds an ACE to the end of the
list. The ACE matches on all source and destination IP addresses and
denies them.
To modify an ACE, select the part of the ACE you want to modify, and
edit or select the new value. (For information about ACE settings, see
“Viewing and Configuring ACLs” on page 222.)
Summary of Contents for OfficeConnect WX1200
Page 16: ......
Page 48: ...48 CHAPTER 2 WORKING WITH THE 3WXM USER INTERFACE ...
Page 236: ...236 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS ...
Page 288: ...288 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS ...
Page 332: ...332 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS ...
Page 364: ...364 CHAPTER 10 MANAGING WX SYSTEM IMAGES AND CONFIGURATIONS ...
Page 476: ...476 CHAPTER 17 DETECTING AND COMBATTING ROGUE DEVICES ...
Page 492: ...492 CHAPTER A CHANGING 3WXM PREFERENCES ...
Page 514: ...514 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS ...
Page 520: ...520 INDEX ...