65
Chapter 8: Configuring the Wireless-G Router for Mobile Broadband
The Wireless Tab - Wireless Security
Wireless-G Router for Mobile Broadband
WPA2 Enterprise
. This option features WPA2 used in coordination with a RADIUS server. (This should only be
used when a RADIUS server is connected to the Router.) WPA2 automatically uses TKIP + AES with dynamic
encryption keys. Enter the RADIUS server’s IP Address and port number, along with a key shared between the
Router and the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change
the encryption keys.
Change these settings as described here, and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
WPA Enterprise
. This option features WPA used in coordination with a RADIUS server. (This should only be used
when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm you want to use,
TKIP
or
AES
. Enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and
the server. Last, enter a Key Renewal Timeout, which instructs the Router how often it should change the
encryption keys.
Change these settings as described here, and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes.
Figure 8-22: Wireless Tab - Wireless Security (WPA2
Enterprise)
Figure 8-23: Wireless Tab - Wireless Security (WPA
Enterprise - TKIP)
Figure 8-24: Wireless Tab - Wireless Security (WPA Enterprise -
AES)
Summary of Contents for WRT54G3G-ST
Page 128: ...119 Appendix I Regulatory Information Wireless G Router for Mobile Broadband...
Page 129: ...120 Appendix I Regulatory Information Wireless G Router for Mobile Broadband...
Page 130: ...121 Appendix I Regulatory Information Wireless G Router for Mobile Broadband...
Page 131: ...122 Appendix I Regulatory Information Wireless G Router for Mobile Broadband...