User manual SMC 2555W-AG

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual SMC 2555W-AG. We hope that this SMC 2555W-AG user guide will be useful to you.

Lastmanuals help download the user guide SMC 2555W-AG.


Mode d'emploi SMC 2555W-AG
Download

You may also download the following manuals related to this product:

   SMC 2555W-AG FICHE TECHNIQUE (119 ko)

Manual abstract: user guide SMC 2555W-AG

Detailed instructions for use are in the User's Guide.

[. . . ] SMC2555W-AG EliteConnectTM Universal 2. 4GHz/5GHz Wireless Access Point User Guide The easy way to make all your network connections 38 Tesla Irvine, CA 92618 Phone: (949) 679-8000 April 2004 Revision Number: R02, F3. 0. 02 Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. [. . . ] · WPA authentication over 802. 1x: The WPA enterprise mode that uses IEEE 802. 1x to authenticate users and to dynamically distribute encryption keys to clients. WPA Pre-shared Key: The WPA mode for small networks that uses a common password string that is manually distributed. If this mode is selected, be sure to also specify the key string. · Multicast Cipher Mode ­ Selects an encryption method for the global key used for multicast and broadcast traffic, which is supported by all wireless clients. · WEP: WEP is the first generation security protocol used to encrypt data crossing the wireless medium using a fairly short key. Communicating devices must use the same WEP key to encrypt and decrypt radio signals. WEP has many security flaws, and is not recommended for transmitting highly-sensitive data. TKIP: TKIP provides data encryption enhancements including per-packet key hashing (that is, changing the encryption key on each packet), a message integrity check, an extended initialization vector with sequencing rules, and a re-keying mechanism. AES: AES has been designated by the National Institute of Standards and Technology as the successor to the Data Encryption Standard (DES) encryption algorithm, and will be used by the U. S. government for encrypting all sensitive, nonclassified information. Because of its strength, and resistance to attack, AES is also being incorporated as part of the 802. 11 standard. · · 5-60 Radio Interface WPA Pre-Shared Key Type ­ If the WPA pre-shared-key mode is used, all wireless clients must be configured with the same key to communicate with the access point. · · Hexadecimal: Enter a key as a string of 64 hexadecimal numbers. Alphanumeric: Enter a key as an easy-to-remember form of letters and numbers. The string must be from 8 to 63 characters, which can include spaces. The configuration settings for WPA are summarized below: WPA pre-shared key only Authentication Type: Open System WEP (encryption): Enable1 WPA clients only: Enable WPA Mode: Pre-shared-key Multicast Cipher: WEP/TKIP/AES2 WPA PSK Type Hex: 64 characters ASCII: 8-63 characters Shared Key: 64/128/152 802. 1x = Disabled3 MAC Authentication: Disabled/Local4 WPA over 802. 1x Authentication Type: Open System WEP (encryption): Enable1 WPA clients only: Enable WPA Mode: WPA over 802. 1x Multicast Cipher: WEP/TKIP/AES2 Shared Key: 64/128/152 802. 1x = Required3 MAC Authentication: Disabled/Local4 1: Although WEP keys are not needed for WPA, you must enable WEP encryption through the web or CLI in order to enable all types of encryption in the access point. For example, use the CLI encryption command to set Encryption = 64, 128 or 152, thus enabling encryption (i. e. , all types of encryption) in the access point. 2: Do not use WEP unless the access point must support both WPA and WEP clients. 3: See Authentication (page 5-14) 4: See Radius (page 5-10) CLI Commands for WPA Pre-shared Key Security ­ From the 802. 11a or 802. 11g interface configuration mode, use the authentication command to set the access point to "Open System. " Use the WEP encryption command to enable all types of encryption. To enable WPA to be required for all clients, use the wpa-clients command. Use the wpa-mode command to enable the Pre-shared Key mode. To enter a key value, use the wpa-psk-type command to specify a hexadecimal or alphanumeric key, and then use the wpa-preshared-key command to define the key. Then disable 802. 1x and MAC 5-61 System Configuration authentication. To view the current 802. 11g security settings, use the show interface wireless a or show interface wireless g command (not shown in example). SMC-AP(config)#interface wireless g Enter Wireless configuration commands, one per line. SMC-AP(if-wireless g)#authentication open SMC-AP(if-wireless g)#encryption 128 SMC-AP(if-wireless g)#wpa-clients required SMC-AP(if-wireless g)#wpa-mode pre-shared-key SMC-AP(if-wireless g)#wpa-psk-type alphanumeric SMC-AP(if-wireless g)#wpa-preshared-key ASCII asecret SMC-AP(if-wireless g)#end SMC-AP(config)#no 802. 1x SMC-AP(config)#no mac-authentication 6-68 6-83 6-84 6-90 6-92 6-94 6-93 6-51 6-57 CLI Commands for WPA over 802. 1x Security ­ From the 802. 11a or 802. 11g interface configuration mode, use the authentication command to set the access point to "Open System. " Use the WEP encryption command to enable all types of encryption. [. . . ] Power over Ethernet (PoE) A specification for providing both power and data to low-power network devices using a single Category 5 Ethernet cable. PoE provides greater flexibility in the locating of access point's and network devices, and significantly decreased installation costs. RADIUS A logon authentication protocol that uses software running on a central server to control access to the network. Roaming A wireless LAN mobile user moves around an ESS and maintains a continuous connection to the infrastructure network. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SMC 2555W-AG

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual SMC 2555W-AG will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag