
28
www.cooperbussmann.com/wirelessresources
Cooper Bussmann 945U-E Wireless Ethernet Modem & Device Server User Manual
Rev Version 2.14
3.4 Network Configuration
You can view or modify Ethernet network parameters by selecting the Network menu. When prompted for the
username and password, enter “user” as the username, and “user” as the password. This is the factory default
setting. To change the default username and password, see “3.23 Module Information Configuration.” If you have
forgotten the IP address or password, the factory default switch may be used to access the existing configuration.
Refer to the previous section for more information.
Figure 24 Network
The Network Configuration page allows configuration of parameters related to the wired and wireless Ethernet
interfaces. In general, IP address selection will be dependent upon the connected wired Ethernet device(s). Before
connecting to an existing LAN consult the network administrator.
Default configuration of the module will be “Client” and “Bridge.” When in Bridged mode the module’s wired and
wireless IP address will be the same, meaning only one IP address is required. If the device mode is changed to
“Router” the page will display two IP addresses, one for Ethernet and one for wireless. For more information on
bridging networks, see “3.18 Routing.”
If the module has been configured for VLAN, the page will show device mode as “VLAN Bridge,” and the Ethernet
IP and netmask will no longer be editable. See “3.22 VLAN” for details on VLAN configuration.
A system of 945U-Es must have at least one access point, configured as a master, and have one or more
clients. All 945U-Es should be given the same system address (ESSID) and radio encryption settings. For further
information and examples on wireless network topologies refer to “1.0 Network Topology.”
The 945U-E supports several different radio encryption schemes. If utilizing any form of encryption, all modules in
the system that communicate with each other will need the same encryption method and encryption keys.
The available encryption methods are as follows:
•
WEP (Wired Equivalent Privacy)
encryption is the weakest encryption method defined by the original
IEEE802.11 standard and uses a 40-bit or 104-bit key with a 24-bit initialization vector to give a 64-bit and
128-bit WEP encryption level. WEP is not considered an effective security scheme, and should only be used
if it is necessary to inter-operate with other equipment which does not support more modern encryption
methods.
•
WPA (Wi-Fi Protected Access)
is a subset of the IEEE802.11i Security Enhancements specification.
•
WPA2 (Wi-Fi Protected Access 2)
replaced WPA and provides significant security improvements over this
method. In particular, it introduces CCMP, a new AES-based encryption mode with strong security.