4. CONFIGURATION
Continued from previous page
Item
Description
WEP Key 1-4
Items for different four WEP keys
•
WEP key in ASCII format must be entered in quotes and must
have the following lengths:
–
5 ASCII characters (40b WEP key)
–
13 ASCII characters (104b WEP key)
–
16 ASCII characters (128b WEP key)
•
WEP key in hexadecimal format must be entered using only
hexadecimal digits and must the following lengths:
–
10 hexadecimal digits (40b WEP key)
–
26 hexadecimal digits (104b WEP key)
–
32 hexadecimal digits (128b WEP key)
WPA PSK Type
The type of encryption when WPA-PSK authenticating:
•
256-bit secret
•
ASCII passphrase
•
PSK File
WPA PSK
Key for WPA-PSK authentication. This key must be entered accord-
ing to the selected WPA-PSK type as follows:
•
256-bit secret
– 64 hexadecimal digits
•
ASCII passphrase
– from 8 to 63 characterswhich are subse-
quently converted into PSK
•
PSK File
– absolute path to the file containing the list of pairs
(PSK key, MAC address)
Access List
Determines a manner of Access/Deny list application:
•
Disabled
– Access/Deny list is not used
•
Accept
– Only items mentioned in the Access/Deny list have
access to the network
•
Deny
– Items mentioned in the Access/Deny list do not have
access to the network
Accept/Deny List
Accept or Denny list of client MAC addresses that set network ac-
cess. Each MAC address is separated by new line.
Continued on next page
33
Summary of Contents for V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 17: ...3 STATUS Figure 2 Mobile WAN status 8 ...
Page 20: ...3 STATUS Figure 4 WiFi Scan 11 ...
Page 37: ...4 CONFIGURATION Figure 17 Mobile WAN configuration 28 ...
Page 64: ...4 CONFIGURATION Figure 36 IPsec tunnels configuration 55 ...
Page 91: ...4 CONFIGURATION Figure 59 Example 2 USB port configuration 82 ...