Chapter 5 Device Network Settings
Vantage CNM User’s Guide
117
The following table describes the fields in these settings.
Table 33
Wireless Card: Static WEP
LABEL
DESCRIPTION
Security
Select Static WEP from the drop-down list.
WEP
Encryption
WEP (Wired Equivalent Privacy) provides data encryption to prevent
unauthorized wireless stations from accessing data transmitted over the
wireless network.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Key 1 to Key
4
If you chose 64-bit WEP in the WEP Encryption field, then enter any 5
characters (ASCII string) or 10 hexadecimal characters ("0-9", "A-F")
preceded by 0x for each key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13
characters (ASCII string) or 26 hexadecimal characters ("0-9", "A-F")
preceded by 0x for each key.
There are four data encryption keys to secure your data from
eavesdropping by unauthorized wireless users. The values for the keys
must be set up exactly the same on the access points as they are on the
wireless stations.
Table 34
Wireless Card: WPA-PSK
LABEL
DESCRIPTION
Security
Select WPA-PSK from the drop-down list.
Pre-Shared
Key
The encryption mechanisms used for WPA and WPA-PSK are the same.
The only difference between the two is that WPA-PSK uses a simple
common password, instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters
(including spaces and symbols).
ReAuthenticati
on Timer
(Seconds)
Specify how often wireless stations have to resend user names and
passwords in order to stay connected. Enter a time interval between 10
and 65535 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Summary of Contents for VANTAGE CNM
Page 2: ......
Page 20: ...New Template User s Guide 20...
Page 23: ...23 PART I Introduction Introducing Vantage CNM 21 GUI Introduction 25...
Page 24: ...24...
Page 46: ...46...
Page 50: ...Chapter 3 Load or Save Building Blocks BB Vantage CNM User s Guide 50...
Page 140: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 140 IKE Gateway Policy Add Edit...
Page 242: ...Chapter 8 Device Log Vantage CNM User s Guide 242...
Page 246: ...246...
Page 346: ...Chapter 11 IPSec VPN Vantage CNM User s Guide 346...
Page 356: ...Chapter 13 L2TP VPN Vantage CNM User s Guide 356...
Page 384: ...Chapter 14 Vantage CNM User s Guide 384...
Page 408: ...408...
Page 456: ...Chapter 18 Firmware Management Vantage CNM User s Guide 456...
Page 474: ...474...
Page 494: ...494...
Page 534: ...Chapter 26 Device Alarm Vantage CNM User s Guide 534...
Page 535: ...535 PART VII Log Report Device Operation Report 537 CNM Logs 553 VRPT 555...
Page 536: ...536...
Page 552: ...Chapter 27 Device Operation Report Vantage CNM User s Guide 552...
Page 560: ...560...
Page 580: ...Chapter 30 CNM System Setting Vantage CNM User s Guide 580...
Page 588: ...Chapter 33 Vantage CNM Software Upgrade Vantage CNM User s Guide 588...
Page 592: ...Chapter 35 About CNM Vantage CNM User s Guide 592...
Page 593: ...593 PART IX Account Management User Group 595 Account 599...
Page 594: ...594...
Page 598: ...Chapter 36 User Group Vantage CNM User s Guide 598...
Page 603: ...603 PART X Troubleshooting Troubleshooting 605...
Page 604: ...604...
Page 610: ...610...
Page 616: ...Appendix A Product Specifications Vantage CNM User s Guide 616...
Page 634: ...Appendix B Setting up Your Computer s IP Address Vantage CNM User s Guide 634...
Page 656: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 656...
Page 666: ...Appendix G Importing Certificates Vantage CNM User s Guide 666...