User's Manual

Table Of Contents
Chapter 4: Configuring Wireless Access
6. In the Security field, select a security method for the wireless network:
l Open - This method requires no authentication to connect to the wireless device
and provides no data encryption.
Note: This is the least secure option and is NOT recommended.
l WPA - This method uses the Temporal Key Integrity Protocol (TKIP) to connect to
the wireless device.
l This security method generates a new 128-bit key for each packet the device
transmits.
l Enter the security password in the Security Key field.
Important: All other devices that access this device must use the key
entered in the WPA field.
l WPA2 - This method uses CCMP, a strong AES encryption method, for securing
data over the network providing stronger security than WPA.
l Enter the security password in the Security Key field.
Important: All other devices that access this device must use the key
entered in the WPA2 field.
l WPA2-Enterprise - This method is a type of WPA2 security, WPA2-Enterprise
uses an external RADIUS server to authenticate users.
Note: For more information about defining RADIUS settings, see Defining
EAP Authentication and External RADIUS Servers on page 95.
l Encryption - This method is available when either WPA or WPA2 is selected in
the Security field.
Select either the AES or TKIP method the device uses to access the network.
Note: The selected security method should match the security method defined in
the Wireless LAN > Radios > Basic menu.
7. ClickSave to save the changes and send them to the WavePoint 10e or click the X in the
upper right corner to clear any changes without saving.
Restricting Access by MAC Address
To increase the security of the wireless network, restrict access to the network to only specific
devices based on their hardware address, or MAC address. Creating an Access Control List
Page 92 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.