
Operation and Configuration Guide 3.14
78
4118618
•
Monitors
: selects a defined monitor for detecting the availability of the link.
The factory-defined monitor is DefaultMonitor and is commonly blocked within
enterprise networks. Use an enterprise specific monitor.
•
Monitor Mode
: defines the action that will occur on the link if the monitor fails
or succeeds:
·
Success in one monitor keeps the link up
(default): if at least one
monitor is reporting as active, then the link should be considered up.
·
Failure in one monitor declares the link down
: if any one monitor is
reporting as inactive, then the link should be considered down.
•
VPN
: select one or more of the defined VPNs. This is only applicable if VPNs
have been configured through VPN Configuration. Note that each of the
VPNs in a multi-VPN selection must be LAN to LAN.
•
Split Access
: allows an incoming session to initiate on a link even when the
link is not the active (i.e. default route) link but is connected to the network.
This is useful for applications such as live video look-in to a WiFi interface
even if the active connection is via another WAN (e.g. cellular).
Security Settings
•
Encryption
: specifies which family of encryption should be used by the oMG
when connecting on this network (e.g. WEP, WPA, WPA2).
•
Authentication
: based on the encryption selection, an authentication
protocol is chosen.
•
PEAP Version
: (if enabled) the version of the PEAP (Protected Extensible
Authentication Protocol) that should be used.
•
PEAP Label
: (If enabled) specifies which type of client encryption (EAP/
PEAP) to use.
•
PEAP Inner Authentication
: (if enabled) specifies which inner authentication
algorithm to use.
•
WEP Key Size
: if WEP is chosen as the Encryption, this field specifies the
size of the key to be used.
•
WEP Key
: if WEP is chosen as the Encryption method, this field specifies the
key to be used. Note that the value is obfuscated for security reasons.
•
Retype WEP Key
: if WEP is chosen as the Encryption method, the WEP Key
must be re entered here to verify the obfuscated value entered in the previous
field.
•
WPA Pre-Shared Key
: if WPA is chosen as the Encryption method, this field
specifies the key which the administrator of the WiFi network has provided.
Note that the value is obfuscated for security reasons.
•
Retype WPA Pre-Shared Key
: if WPA is chosen as the Encryption method,
the WPA Pre Shared Key must be re entered here to verify the obfuscated
value entered in the previous field.
•
Change WPA Key
: this option is available after the initial pre shared key has
been saved. Enabling this option provides the following fields for changing the
key:
·
Previous WPA Pre-Shared Key
: specify the previously saved pre shared
key.
·
New WPA Pre-Shared Key
: the new the pre-shared key to use.
·
Retype New WPA Pre-Shared Key
: retype the new pre-shared key here
to ensure it was entered correctly.