User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
Chapter 4: Configuring Wireless Access
6. In the Security field, select a security method for the wireless network:
l Open - This method requires no authentication to connect to the wireless device
and provides no data encryption.
Note: This is the least secure option and is NOT recommended.
l WPA - This method uses the Temporal Key Integrity Protocol (TKIP) to connect to
the wireless device.
l This security method generates a new 128-bit key for each packet the device
transmits.
l Enter the security password in the Security Key field.
Important: All other devices that access this device must use the key
entered in the WPA field.
l WPA2 - This method uses CCMP, a strong AES encryption method, for securing
data over the network providing stronger security than WPA.
l Enter the security password in the Security Key field.
Important: All other devices that access this device must use the key
entered in the WPA2 field.
l WPA2-Enterprise - This method is a type of WPA2 security, WPA2-Enterprise
uses an external RADIUS server to authenticate users.
Note: For more information about defining RADIUS settings, see Defining
EAP Authentication and External RADIUS Servers on page 95.
l Encryption - This method is available when either WPA or WPA2 is selected in
the Security field.
Select either the AES or TKIP method the device uses to access the network.
Note: The selected security method should match the security method defined in
the Wireless LAN > Radios > Basic menu.
7. ClickSave to save the changes and send them to the WavePoint 10e or click the X in the
upper right corner to clear any changes without saving.
Restricting Access by MAC Address
To increase the security of the wireless network, restrict access to the network to only specific
devices based on their hardware address, or MAC address. Creating an Access Control List
Page 92 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.