Accton Technology 7404WBRAACC User Manual

Wireless
The Barricade also operates as a wireless-to-wired bridge, allowing wireless computers to access resources available on the wired LAN, and to access the Internet. To configure the Barricade as a wireless access point for wireless clients (either stationary or roaming), all you need to do is enable the wireless function, define the radio channel, the domain identifier, and the encryption options. Check Enable and click APPLY.
W
IRELESS
4-25
C
ONFIGURING THE BARRICADE
Channel and SSID
You must specify a common radio channel and SSID (Service Set ID) to be used by the Barricade Wireless Router and all of your wireless clients. Be sure you configure all of your clients to the same values.
Parameter Description
ESSID Extended Service Set ID. The ESSID must be the same on the
Transmission Rate The default is Fully Automatic. The transmission rate is
Barricade and all of its wireless clients.
automatically adjusted based on the receiving data error rate. Usually the connection quality will vary depending on the distance between the wireless router and wireless adapter. You can also select a lower transmission data rate to maximize the radio communication range.
4-26
W
IRELESS
Parameter Description
Basic Rate The highest rate specified will be the rate that the Barricade will
use when transmitting broadcast/multicast and management frames. Available options are: All (1, 2, 5.5, and 11Mbps), and 1, 2Mbps (default is 1, 2Mbps).
Channel The radio channel must be the same on the Barricade and all of
your wireless clients.
The Barricade will automatically assign itself a radio channel, or you may select one manually.
4-27
C
ONFIGURING THE BARRICADE
Encryption
If you are transmitting sensitive data across wireless channels, you should enable encryption. You must use the same set of encryption keys for the Barricade and all of the wireless clients. Choose between standard 64-bit WEP (Wired Equivalent Privacy) or the more robust 128-bit encryption.
You may automatically generate encryption keys or manually enter the keys. For automatic 64-bit security, enter a passphrase and click Generate, four keys will be generated. Choose a key from the drop-down list or accept the default key. Automatic 128-bit security generates a single key.
Note: The passphrase can consist of up to 32 alphanumeric characters.
To manually configure the keys, enter five hexadecimal pairs of digits for each 64-bit key, or enter 13 pairs for the single 128-bit key. (A hexadecimal digit is a number or letter in the range 0-9 or A-F.)
Note that WEP protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network or over the Internet.
4-28
MAC Address Filtering
Client computers can be filtered using the unique MAC address of their IEEE 802.11 network card. To secure an access point using MAC address filtering, you must enter a list of allowed/denied client MAC addresses into the filtering table. (See “Finding the MAC address of a Network Card” on page 4-57.)
W
IRELESS
Parameter Description
Filtering
Disable Disables MAC address filtering.
Enable Enables MAC address filtering.
Setting
Permissions Allows only devices with their MAC address in the list to
connect to the Barricade.
Prohibition Denies access to the Barricade from devices with their
MAC address in the list.
4-29
C
ONFIGURING THE BARRICADE
NAT
Some applications require multiple connections, such as Internet gaming, videoconferencing, and Internet telephony. These applications may not work when Network Address Translation (NAT) is enabled. If you need to run applications that require multiple connections, use these pages to specify the additional public ports to be opened for each application.
Address Mapping
Allows one or more public IP addresses to be shared by multiple internal users. This also hides the internal network for increased privacy and security. Enter the Public IP address you wish to share into the Global IP field. Enter a range of internal IPs that will share the global IP into the from field.
4-30
Virtual Server
If you configure the Barricade as a virtual server, remote users accessing services such as Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the Barricade redirects the external service request to the appropriate server (located at another internal IP address).
NAT
If you configure the Barricade as a virtual server, remote users accessing services such as Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), the Barricade redirects the external service request to the appropriate server (located at another internal IP address).
4-31
C
ONFIGURING THE BARRICADE
For example, if you set Type/Public Port to TCP/80 (HTTP or Web) and the Private IP/Port to 192.168.2.2/80, then all HTTP requests from outside users will be transferred to 192.168.2.2 on port 80. Therefore, by just entering the IP Address provided by the ISP, Internet users can access the service they need at the local address to which you redirect them.
The more common TCP service ports include:
HTTP: 80, FTP: 21, Telnet: 23, and POP3: 110. A list of ports is maintained at the following link: http://www.iana.org/assignments/port-numbers.
Note: The WAN interface should have a fixed IP address to best utilize
this function. If your ISP only provides dynamic IP addresses, a search for “free dynamic IP” on any major search engine will turn up tools that will allow you to use the same domain name even though your IP address changes each time you log into the ISP.
4-32
Loading...
+ 17 hidden pages