RADIUS Port
(Relevant only when the
RADIUS server is enabled)
Enter the UDP port number of the RADIUS server. The
default port is 1812.
RADIUS Key
(Relevant only when the
RADIUS server is enabled)
Enter the RADIUS Key.
Group Key Rotation
Interval
(Relevant only when the
RADIUS server is enabled)
When enabled, the Cable Modem/Router generates the
best possible random group key and updates all
key-management capable clients periodically. Set to zero
to disable periodic rekeying.
WPA/WPA2 Re-auth
Interval
Interval (in seconds) at which the Cable Modem/Router (if
using WPA-PSK key management) or RADIUS server (if
using WPA key management) sends a new group key out
to all clients. The re-keying process is the WPA equivalent
of automatically changing the WEP key for an AP and all
stations in a WLAN on a periodic basis.
WEP Encryption
WEP Encryption can be set to WEP 128-bit, 64-bit, or
Disable. Both the wireless clients and the Cable
Modem/Router must use the same WEP key.
Shared Key
Authentication
Select Enable to enable. Shared Key authentication is only
available when WEP is enabled.
802.1x Authentication
(only available when WEP
is enabled)
Select Enable to enable 802.1x authentication. Enable
802.1x Authentication only if you have a RADIUS server.
Most users will leave this disabled.
Network Key 1-4
You can pre-define up to 4 keys for 64-bit or 128-bit WEP.
64-bit keys require 10 hexadecimal digits and 128-bit key
require 26 hexadecimal digits.
Current Network Key
Select one of the four pre-defined keys as the current
network key.
PassPhase
Enter a word or group of printable characters and click
Generate WEP keys to generate WEP encryption key.
These characters are case sensitive.
Generate WEP Keys
Click to generate 4 WEP keys automatically.
52
Summary of Contents for 5363
Page 1: ...Cable Modem Router Cable Modem plus Dual band Wireless AC Router U S E R M A N U A L ...
Page 50: ...Figure 4 Example Wireless Primary Network page 50 ...
Page 54: ...Figure 5 Example of Guest Network Page 54 ...
Page 64: ...Figure 9 Example of Access Control Page 64 ...
Page 80: ...Figure 17 Example of IP Filtering Page 80 ...
Page 104: ...Figure 27 Example of Basic Setup Page 104 ...
Page 134: ...Figure 42 Example of the Connection Page 134 ...