User guide

38 | Wireless Network Dell PowerConnect W-Instant Access Point 5.0.3.0-1.1.0.0 | User Guide
You want to use the default security level, Personal Perform the following steps:
1. Select the required key options from the Key management drop-
down list. Available options are:
WPA-2 Personal
WPA Personal
Both (WPA-2 & WPA)
Static WEP
If you have selected Static WEP, then do the following:
Select appropriate WEP key size from the WEP key size drop-
down list. Available options are 64-bit and 128-bit.
Select appropriate Tx key from the Tx Key dropdown list.
Available options are 1, 2, 3,and 4.
Enter an appropriate WEP key and reconfirm.
2. Select a passphrase format from the Passphrase format drop-
down list. Available options are:
8-63 alphanumeric chars
64 hexadecimal chars
3. Enter a passphrase in the Passphrase text box and reconfirm.
4. Select the required option from the MAC authentication drop-
down list. Available options are
None - This option provides open authentication. Any client that
requests association is allowed to connect to the network. Open
authentication is not recommended unless you want users to
gain quick access to the network.
External RADIUS Server - If you select this option, then an external
radius server has to be configured to authenticate the users. For
information on configuring external RADIUS server, see “Configuring
an External RADIUS Server” on page 70.
You select the Open security level Select the required MAC authentication from the MAC
authentication drop-down list. Available options are:
None -This option provides open authentication. Any client that
requests association is allowed to connect to the network. Open
authentication is not recommended unless you want users to
gain quick access to the network.
External RADIUS Server - If you select this option, then an
external radius server has to be configured to authenticate the
users. For information on configuring an external RADIUS
server, see “Configuring an External RADIUS Server” on
page 70.
Table 6 Conditions for Adding an Employee Network - Security Tab (Continued)
If then,