
www.cooperbussmann.com/wirelessresources
Cooper Bussmann 945U-E Wireless Ethernet Modem & Device Server User Manual
29
Rev Version 2.14
•
WPA/WPA2-PSK (Legacy Support)
enables the modem to communicate to all WPA methods including TKIP,
AES, and WPA2 AES. Generally only used if the network has older devices that does not support the higher
level encryption methods. Enabling this option will lower the security level of the network down to the weakest
configured encryption level (WPA TKIP).
•
WPA-Enterprise (802.1x)
removes the need to manage the pre-shared key (PSK) by using an external server
to provide client authentication. Clients that are not authorized will be prevented from accessing the network.
Once a client has provided the correct authentication credentials, access is permitted and data encryption
keys are established, similar to WPA-PSK. Fine grain (user level) access control can be achieved using this
method.
An 802.1x capable RADIUS server may already be deployed in a large scale network environment. The 945U-E
can make use of this server reducing replication of user authentication information.
In a typical WPA-enterprise setup, the 945U-E access point acts as Authenticator, controlling access to the
network. Wireless clients (945U-Es, laptops or other devices) act as Supplicants, requesting access to the
network. The Authenticator communicates with an authentication (RADIUS) server on the Ethernet network to
verify Supplicant identity. When a Supplicant requests access, it sends an access request to the Authenticator,
which passes an authentication request to the external authentication server. When the user credentials of the
Supplicant are verified, the Authenticator enables network access for the Supplicant, data encryption keys are
established and network traffic can pass.
Configuration of WPA-enterprise differs when the unit is configured as an access point (Authenticator) or client
(Supplicant). If WDS interfaces are used, it is possible for one 945U-E to act as both an Authenticator and a
Supplicant, but in this situation only one set of user credentials can be entered for all Supplicants.
The 945U-E supports WPA-1 TKIP, WPA-1 AES and WPA-2 AES using a pre-shared key (PSK).
•
WPA PSK TKIP
(Temporal Key Integrity Protocol) enhances WEP by using 128-bit encryption plus separate
64-bit TX and RX MIC (message integrity check) keys.
•
WPA PSK AES
(Advanced Encryption Standard) uses the more advanced CCMP encryption protocol and is
essentially a draft of the IEEE 802.11i wireless network standard. This is the recommended encryption method
for most applications.
•
WPA2 AES
(Advanced Encryption Standard) is the most secure encryption method and is also based on
128-bit encryption key.
After changes are made to Network Configuration, it is important to save the configuration by clicking Save
Changes or by clicking Save Changes and Reset.
NOTE If making changes to a remote module via the radio link, make sure all changes are compliant
and accurate before clicking Save to Flash and Reset. Some field changes may stop the radio link from
working and will require a hard wire connection to restore.
Network Settings Webpage Fields
Operating Mode
Used to select Access Point (Infrastructure), Client (Infrastructure). By default this is
set to Client.
System Address
(ESSID)
A 945U-E wireless network comprises modules with the same system address.
Only modules with the same system address will communicate with each other.
The system address is a text string 1–31 characters long. Select a text string that
identifies your system.
Desired BSSID
To force a client/station to always connect to the same access point, enter the MAC
address of that access point in the Desired BSSID field. Note that the ESSID of the
access point must also match the configured ESSID of the client.
Radio Encryption
Select the desired radio encryption level. The encryption key, passphrase, and other
security information is entered on the Security Menu. See “3.6 Security Menu.”