User's Manual
Table Of Contents
- Copyright © 2004, Vivato, Inc.
- Who Should Read This Document?
- Printing This Document
- VIVATO, INC. END USER LIMITED WARRANTY AND LICENSE TERMS
- Safety Information
- FCC Declaration of Conformity
- Conventions Used in This Document
- Contact Information
- VIVATO, INC. END USER LIMITED WARRANTY AND LICENSE TERMS 3
- Safety Information 9
- Introduction 23
- Installation 29
- Initial Configuration Using the Built-In Web Pages 35
- Using the Main Configuration Web Pages 51
- Network Configuration Web Pages 55
- Security Configuration Web Pages 71
- Monitoring Clients and System Operations 79
- Services, Password, Config, and Firmware Web Pages 85
- Diagnostics Web Screen and Help 93
- Configuration Using The Command Line Interface 95
- Network Monitoring 145
- Verifying Wi-Fi Operation 149
- Dynamic Assignment of Client IP Addresses 153
- Updating AP/Bridge Firmware 159
- Introduction
- Powered Ethernet
- Omni-directional Antennas
- Ethernet and Serial Ports
- Reset To Factory Defaults
- Metal Enclosure
- IEEE 802.11 ISM-Band Channel Operation
- Multi-AP/Bridge Operation for Extended Coverage
- Basic Service Set Operation
- Web Page or Command Line Interface Configuration
- Network Configuration Examples
- Specifications
- Shipping Contents
- Installation
- Initial Configuration Using the Built-In Web Pages
- Using the Main Configuration Web Pages
- Network Configuration Web Pages
- Security Configuration Web Pages
Copyright © 2004, Vivato, Inc. Vivato Wi-Fi AP/Bridge User Guide 73
Security Settings
Security Configuration Web Pages
Important Considerations When Using 802.1x
The following conditions must be considered when configuring 802.1x in the Wi-Fi AP/Bridge,
clients, and the services supporting 802.1x.
• If a Win2K Internet Authentication Server (IAS) is used with the Vivato Wi-Fi
AP/Bridge for 802.1x operation, set the 802.1x policies in the IAS to use either
“Strongest” (128-bit) or “Basic” (64-bit) encryption. The “Strong” and “No Encryption“
settings are not supported at this time.
• When configuring Windows XP, Windows XP+SP1 or Win2000+SP3 client for 802.1x,
do not select “Authenticate as computer when computer information is available.” or
“Authenticate as guest when user or computer information is unavailable”. If these
options are selected, a wireless interface on the Wi-Fi AP/Bridge may be left open when
the user logs off. This presents the potential for unauthorized access to the Wi-Fi
AP/Bridge.
Optimizing Your Wireless Client For Secure Communications
The following client configuration information is provided as a reference for setting up WEP. Some
operating systems do not support all types of security. Refer to your client’s documentation for
configuring it to match the recommended settings provided below.
The examples below use the Microsoft Windows XP® Network Connections feature to access and
change the client configuration. The client interface must be enabled to be able to access the client’s
security settings. If the AP/Bridge’s wireless interface is not enabled, its ESSID cannot be seen by
the wireless client card, but the ESSID can still be configured manually.
Step 1. Select Start > Settings > Network Connections.
1