D Link DIR628A2 RangeBooster N Dual Band Router User Manual 6
D Link Corporation RangeBooster N Dual Band Router 6
D Link >
Contents
User manual 6
Section 3 - Configuration Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients. D-Link DIR-628 User Manual 69 Section 3 - Configuration Support D-Link DIR-628 User Manual 70 Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-655 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. D-Link DIR-628 User Manual 71 Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Type your desired wireless network name (SSID). Automatically: Select this option to automatically generate the router’s network key and click Next. Manually: Select this option to manually enter your network key and click Next. D-Link DIR-628 User Manual 72 Section 4 - Security If you selected Automatically, the summary window will display your settings. Write down the security key and enter this on your wireless clients. Click Save to save your settings. If you selected Manually, the following screen will appear. D-Link DIR-628 User Manual 73 Section 4 - Security Add Wireless Device with WPS Wizard From the Basic > Wizard screen, click Add Wireless Device with WPS. Select Auto to add a wireless client using WPS (Wi-Fi Protected Setup). Once you select Auto and click Connect, you will have a 120 second time limit to apply the settings to your wireless client(s) and successfully establish a connection. If you select Manual, a settings summary screen will appear. Write down the security key and enter this on your wireless clients. PIN: Select this option to use PIN method. In order to use this method you must know the wireless client’s 8 digit PIN and click Connect. PBC: Select this option to use PBC (Push Button) method to add a wireless client. Click Connect. D-Link DIR-628 User Manual 74 Section 4 - Security Configure WPA-Personal (PSK) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2. Next to Security Mode, select WPA-Personal. 3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2. 4. Next to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default). 6. Next to Pre-Shared Key, enter a key (passphrase). The key is entered as a pass-phrase in ASCII format at both ends of the wireless connection. The pass-phrase must be between 8-63 characters. 7. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router. D-Link DIR-628 User Manual 75 Section 4 - Security Configure WPA-Enterprise (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2. Next to Security Mode, select WPA-Enterprise. 3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2. 4. Next to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default). 6. Next to Authentication Timeout, enter the amount of time before a client is required to re-authenticate (60 minutes is default). 7. Next to RADIUS Server IP Address enter the IP Address of your RADIUS server. D-Link DIR-628 User Manual 76 Section 4 - Security 8. Next to RADIUS Server Port, enter the port you are using with your RADIUS server. 1812 is the default port. 9. Next to RADIUS Server Shared Secret, enter the security key. 10. If the MAC Address Authentication box is selected then the user will need to connect from the same computer whenever logging into the wireless network. 11. Click Advanced to enter settings for a secondary RADIUS Server. 12. Click Apply Settings to save your settings. D-Link DIR-628 User Manual 77 Section 4 - Security Connect to a Wireless Network Using Windows Vista® Windows Vista® users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows Vista® utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility. or Right-click on the wireless computer icon in your system tray (lower-right corner next to the time). Select Connect to a network. The utility will display any available wireless networks in your area. Click on a network (displayed using the SSID) and click the Connect button. If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. D-Link DIR-628 User Manual 78 Section 4 - Security Configure Wireless Security It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2. Highlight the wireless network (SSID) you would like to connect to and click Connect. D-Link DIR-628 User Manual 79 Section 4 - Security 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router. D-Link DIR-628 User Manual 80
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res Tagged PDF : Yes XMP Toolkit : 3.1-701 Modify Date : 2009:12:29 17:19:07+08:00 Create Date : 2009:12:29 17:19+08:00 Metadata Date : 2009:12:29 17:19:07+08:00 Creator Tool : Adobe InDesign CS2 (4.0.5) Format : application/pdf Document ID : uuid:e1dfa70b-b806-4562-a1a5-9c7e2e701750 Instance ID : uuid:1d4edd0b-6fd0-4d61-9ba1-39360d344de6 Producer : Adobe PDF Library 7.0 Page Count : 12 Creator : Adobe InDesign CS2 (4.0.5)EXIF Metadata provided by EXIF.tools