User manual SMC 2888W-S

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SMC 2888W-S. We hope that this SMC 2888W-S user guide will be useful to you.


SMC 2888W-S : Download the complete user guide (4773 Ko)

You may also download the following manuals related to this product:

   SMC 2888W-S FICHE TECHNIQUE (152 ko)

Manual abstract: user guide SMC 2888W-S

Detailed instructions for use are in the User's Guide.

[. . . ] EliteConnectTM Universal 2. 4GHz/5GHz Wireless Dual-Band Outdoor Access Point/Bridge The easy way to make all your network connections 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 May 2005 Revision Number: R01 F1. 1. 2. 5 Copyright Information furnished by SMC Networks, Inc. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice. [. . . ] CLI Commands for the 802. 11g Wireless Interface ­ From the global configuration mode, enter the interface wireless g command to access the 802. 11g radio interface. Set the interface SSID using the ssid command and, if required, configure a name for the interface using the description command. You can also use the closed-system command to 6-64 Radio Interface stop sending the SSID in beacon messages. Select a radio channel or set selection to Auto using the channel command. To view the current 802. 11g radio settings, use the show interface wireless g command. AP(config)#interface wireless g Enter Wireless configuration commands, one per line. AP(if-wireless g)#description RD-AP#3 AP(if-wireless g)#ssid r&d AP(if-wireless g)#channel auto AP(if-wireless a)#closed-system AP(if-wireless a)#transmit-power full AP(if-wireless g)#speed 6 AP(if-wireless g)#max-association 32 AP(if-wireless g)#beacon-interval 150 AP(if-wireless g)#dtim-period 5 AP(if-wireless g)#fragmentation-length 512 AP(if-wireless g)#rts-threshold 256 AP(if-wireless g)#exit AP#show interface wireless g Wireless Interface Information =========================================================== ----------------Identification----------------------------Description : Enterprise 802. 11g Wireless Outdoor Bridge/AP Service Type : Access Point SSID : r&d Channel : 11 (AUTO) Status : Enable ----------------802. 11 Parameters-------------------------Transmit Power : FULL (14 dBm) Max Station Data Rate : 6Mbps Fragmentation Threshold : 512 bytes RTS Threshold : 256 bytes Beacon Interval : 150 TUs DTIM Interval : 5 beacons Maximum Association : 64 stations ----------------Security----------------------------------Closed System : DISABLED Multicast cipher : WEP Unicast cipher : TKIP WPA clients : SUPPORTED WPA Key Mgmt Mode : DYNAMIC WPA PSK Key Type : HEX Encryption : DISABLED Default Transmit Key :1 Static Keys : Key 1: EMPTY Key 2: EMPTY Key 3: EMPTY Key 4: EMPTY Authentication Type : OPEN =========================================================== AP# 7-99 7-99 7-100 7-102 7-101 7-107 7-101 7-108 7-104 7-104 7-105 7-106 7-120 6-65 System Configuration Security (Bridge Mode) Wired Equivalent Privacy (WEP) and Advanced Encryption Standard (AES) are implemented for security in bridge mode to prevent unauthorized access to network data. To secure bridge link data transmissions, enable WEP or AES encryption for the bridge radio and set at least one encryption key. Wired Equivalent Privacy (WEP) WEP provides a basic level of security, preventing unauthorized access to the network and encrypting data transmitted between wireless bridge units. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that are manually configured on all units in the wireless bridge network. 6-66 Radio Interface Setting up IEEE 802. 11 Wired Equivalent Privacy (WEP) shared keys prevents unauthorized access to the wireless bridge network. Also, be sure that the WEP keys are the same for all bridge units in the wireless network. Data Encryption Setup ­ Enable or disable the wireless bridge to use either WEP or AES for data encryption. If WEP encryption is selected and enabled, you must configure at least one encryption key on the wireless bridge. (Default: Disable) Shared Key Setup ­ Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of WEP encryption key must be set on all bridge units in the wireless network. (Default: 128 Bit) Key Type ­ Select the preferred method of entering WEP encryption keys on the wireless bridge and enter up to four keys: · Hexadecimal: Enter keys as 10 hexadecimal digits (0 to 9 and A to F) for 64 bit keys, 26 hexadecimal digits for 128 bit keys, or 32 hexadecimal digits for 152 bit keys. Alphanumeric: Enter keys as 5 alphanumeric characters for 64 bit keys, 13 alphanumeric characters for 128 bit keys, or 16 alphanumeric characters for 152 bit keys. Bridge units in the wireless network must have all four keys configured to the same values. · · Note: Key index and type must match on all bridge units in the wireless network. 6-67 System Configuration Advanced Encryption Standard (AES) AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U. S. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802. 11 security standard. The bridge radio band uses 128-bit static AES keys (hexadecimal or alphanumeric strings) that are configured for each link pair in the wireless bridge network. A Master bridge allows a different key to be defined for each wireless bridge link in the network. 6-68 Radio Interface Configuring AES encryption keys on the wireless bridge provides far more robust security than using WEP. Also, a unique AES key can be used for each bridge link in the wireless network, instead of all bridges sharing the same WEP keys. Data Encryption Setup ­ Enable or disable the wireless bridge to use either WEP or AES for data encryption. [. . . ] Encryption Data passing between the access point and clients can use encryption to protect from interception and evesdropping. Ethernet A popular local area data communications network, which accepts transmission from computers and terminals. Glossary-2 Glossary File Transfer Protocol (FTP) A TCP/IP protocol used for file transfer. Hypertext Transfer Protocol (HTTP) HTTP is a standard used to transmit and receive all data over the World Wide Web. Internet Control Message Protocol (ICMP) A network layer protocol that reports errors in processing IP packets. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SMC 2888W-S




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SMC 2888W-S will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.