AASTRA SIP-DECT (Release 3.0)- OM System Manual - Installation, Administration and Maintenance EN User Manual

Page 85

Advertising
background image

SIP–DECT OM System Manual Release 3.0

7 OMM Web Service

Aastra

depl-1624/1.0

Page: 85 (241)

Interference avoidance

(on / off, default: off): Enables a WLAN procedure to enhance

radio interference avoidance. This setting applies to RFP (L) 42 WLAN only.

Security settings

These settings determine the encryption used for the WLAN connection. Select one of the
four modes (Open, WEP, WPA, or Radius). This will activate / gray-out the necessary
additional input fields that specify further security settings on the

WLAN profile

page.

Open system

: Enable this option to deactivate authentication and encryption (“Hotel

mode”). Note, that all data is transferred un-encrypted in this mode, which can be easily
eavesdropped with any WLAN equipment.

Wired equivalent privacy (WEP)

: Enable this option to use the older WEP encryption

mode. This mode may be useful, e.g. if your WLAN should support older WLAN clients
that do not implement the recommended WPA encryption.

-

Privacy

(on / off, default: off): De-activate this setting to use no authentication (“Open

System”) with standard WEP encryption. Activate this setting to use an additional
shared key authentication between the RFP and the WLAN client.

-

Number of tx keys

(number, 1..4, default: 1): The WEP encryption can use a single

shared key or multiple shared keys (“key rotation”). Select the number of shared keys,
select how to enter a shared key (by default as

Text

or as

Hex value

), and select the

Cipher length

(see Key settings below).

-

Default tx key

(number, 1..4, default: 1): If more than one shared keys is used, you can

select the default shared key. You need to configure the same default key on the WLAN
client.

-

Key #1

Key #4

: Enter one or more shared key. The

Cipher length

setting (see Key

settings below) determines the length of the required input. If you selected to enter as

Text

(see above), input a password with 5, 13, or 29 characters that matches a 64, 128,

or 256 bit cipher. If you selected to enter as

Hex value

, you can input a hexadecimal

number with 10, 26, or 58 characters (0-9, a-f). Press the

Generate

button to generate

a random shared key that matches the current settings.

WiFi protected access (WPA)

: Enable this option to use the recommended WPA

encryption mode.

-

Type

(selection, WPA any / WPA v.1 / WPA v.2, default: WPA any): Select the WPA

version required for WLAN clients. The

WPA any

setting allows WPA v.1 and WPA v.2

to be used concurrently. The

WPA v.1

setting enforces the use of the older RC4-based

encryption. The

WPA v.2

setting enforce the use of the stronger AES encryption. You

can also change the distribution interval (see Key settings below).

-

802.1x (Radius)

: Select this option if your WLAN should use a RADIUS server for

WLAN client authentication (“Enterprise WPA” with different username/password
combinations per client). You also need to specify the Radius settings (see below). For
details about the RADIUS authentication procedure, using the public keys, and
importing certificates to the WLAN clients refer to the documentation of your RADIUS
server product.

-

Pre-shared key

: Select this option to use a single shared key for all WLAN clients

(

Value

setting below). A WLAN client user needs to enter the shared key in order to

connect.

Advertising