User Manual

Table Of Contents
Configuring the Wireless Network
Configuring Wireless Profiles
Cisco RV 120W Administration Guide 64
3
WPA Enterprise—Allows you to use WPA with RADIUS server
authentication.
WPA2 PersonalWPA2 is the implementation of security standard
specified in the final 802.11i standard. It supports AES encryption and this
option uses preshared key (PSK) based authentication.
WPA2 Personal Mixed—Allows both WPA and WPA2 clients to connect
simultaneously using PSK authentication.
WPA2 Enterprise—Allows you to use WPA2 with RADIUS server
authentication.
WPA2 Enterprise Mixed—Allows both WPA and WPA2 clients to connect
simultaneously using RADIUS authentication.
STEP 7 Perform the following steps based on the type of encryption you chose in Step 6:
WPA/WPA2
a. Select the encryption method to be used: TKIP, AES, or TKIP+AES.
b. Select the authentication method to be used: RADIUS, PSK, or PSK + RADIUS.
c. WPA Password—Enter the pre-shared key for WPA/WPA2 PSK authentication.
The clients also need to be configured with the same password.
d. (Optional) Check the Enable Pre-Authentication box to enable pre-
authentication for this profile. Pre-authentication allows wireless clients to
quickly switch between connected Access Points sharing the same security
configuration. This is mainly used when APs are configured with WPA/WPA2
security. In event of wireless client disconnecting from an AP, a notification is
sent to the AP, which then sends the pre-authentication info to other APs in the
network.
WEP
In the WEP Index and Keys section:
a. In the Authentication field, choose Open System or Shared Key. If you choose
open system, a wireless client doesn't need to provide a shared key in order to
access the wireless network. Any client can associate to the router. If you
choose shared key, a wireless client must provide the correct shared key
(password) in order to access the wireless network.
b. Select the encryption type (64- or 128-bit). The larger size keys provide
stronger encryption, making the key more difficult to crack (for example, 64-bit