Motorola SURFBOARD SVG2500 User Manual

Page 113

Advertising
background image

9 SVG2500 WIRELESS PAGES

98

Field

Description

WPA
WPA2

Enables or disables Wi-Fi Protected Access (WPA) encryption.

WPA-PSK
WPA2-PSK

Enables or disables a local pre-shared key (WPA-PSK) passphrase.

WPA/WPA2 Encryption

When using WPA or WPA-PSK authentication, these WPA
encryption modes can be set: TKIP, AES, or TKIP + AES.

AES (Advanced Encryption Standard) provides the strongest
encryption, while TKIP (Temporal Key Integrity Protocol) provides
strong encryption with improved compatibility. The TKIP + AES
mode allows both TKIP and AES-capable clients to connect.

WPA Pre-Shared Key

Sets the WPA Pre-Shared Key (PSK). This is either an 8-63 ASCII
character string or a 64-digit hex number. Enabled when the
Network Authentication method is WPA-PSK.

RADIUS Server

Sets the RADIUS server IP address to use for client authentication
using the dotted-decimal format (xxx.xxx.xxx.xxx).

RADIUS Port

Sets the UDP port number of the RADIUS server. The default is
1812.

RADIUS Key

Sets the shared secret for the RADIUS connection. The key is a 0 to
255 character ASCII string.

Group Key Rotation Interval

Sets the WPA Group Rekey Interval in seconds. Set to zero to
disable periodic rekeying.

WPA/WPA2 Re-auth Interval

WPA and WPA2 are two security features in WiFi technology. This
field, re-authentication interval, is the amount of time the wireless
router can wait before re-establishing authentication with the CPE.

WEP Encryption

Enables or disables Wired Equivalent Privacy encryption.

Shared Key Authentication

The WEP protocol uses Shared Key Authentication, which is an
Authentication protocol where the CPE sends an authentication
request to the access point. Then the access point sends a
challenge text to the CPE.

The CPE uses either the 64-bit or 128-bit key to encrypt the
challenge text and sends the encrypted text to the access point. The
access point will decrypt the encrypted text and then compare the
decrypted message with the original challenge text. If they are the
same, the access point will let the CPE connect; if it doesn’t match,
then the access point does not let the CPE connect.

802.1x Authentication

This is another type of authentication and is used on top of WEP.
802.1x Authentication is a much stronger type of authentication than
WEP.

Advertising