User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
Chapter 4: Configuring Wireless Access
c. By default, the device is set to broadcast the wireless network name.
Broadcasting the name allows other wireless devices to see the device
automatically.
Set the Hide SSID option to Off to disable the broadcast.
Note: Other wireless devices can still connect; however, they do not
automatically see this device in their access lists.
7. In the Security field, select a security method for the wireless network:
l Open - This method requires no authentication to connect to the wireless device
and provides no data encryption.
Note: This is the least secure option and is NOT recommended.
l WPA - This method uses the Temporal Key Integrity Protocol (TKIP) to connect to
the wireless device.
l This security method generates a new 128-bit key for each packet the device
transmits.
l Enter the security password in the Security Key field.
Note: All other devices that access this device must use the key entered
here.
l WPA2 - This method uses CCMP, a strong AES encryption method, for securing
data over the network providing stronger security than WPA.
l Enter the security password in the Security Key field.
Note: All other devices that access this device must use the key entered
here.
l WPA2-Enterprise - This method is a type of WPA2 security, WPA2-Enterprise
uses an external RADIUS server to authenticate users.
Note: For more information about defining RADIUS settings, see Defining EAP
Authentication and External RADIUS Servers on page 95.
8. Optional: Set the AP Isolation field to Off to allow devices that connect to this
WavePoint 10e to connect with one another.
This setting applies only if the device is configured as the Access Point in the Mode field.
The default setting is On, devices can connect to this access point, but cannot connect
directly to other connected devices.
Page 84 of 171 LUM0063AA Rev 05/05/2014
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.