
AirWorks AWK-1100 User’s Manual Web Console Configuration
AP 1 AP 2
STA 1
STA 2
STA 3
Wireless Link
Ethernet Link
Switch
WCI:
All APs in This
Subnet
WCI:
All APs in This
Subnet
Behavior of the “All APs on This Subnet” wireless client isolation option
When AP 1 and AP 2 are using the “This AP Only” option, wireless traffic between STA 1 and
STA 2 is blocked by AP 1, whereas wireless traffic between STA 2 and STA 3 (which are
associated with different APs) is still allowed. If the “All APs in This Subnet” option is used as
shown in above figure, AP 1 and AP 2 communicate with each other via an inter-AP protocol to
share their STA association information to block wireless traffic among all the STAs.
A total of 7 security modes are available with the different AWK-1100 models:
y
Open System. No authentication, no data encryption.
y
Static WEP. WEP (Wired Equivalent Privacy) keys must be manually configured.
y
Static TKIP (WPA-PSK). Only TKIP (Temporal Key Integrity Protocol) mechanism of WPA
(Wi-Fi Protected Access) is enabled. In this mode, you need to specify the Pre-shared key,
which will be used by the TKIP engine as a master key to generate keys that actually encrypt
outgoing packets and decrypt incoming packets.
NOTE
The number of characters of the Pre-shared key setting must be at least 8 and can be up to 63.
y IEEE 802.1X EAP without Encryption (EAP-MD5). The IEEE 802.1X functionality is
enabled and the user-name/password-based EAP-MD5 authentication is used. No data
encryption.
y
IEEE 802.1X EAP with Static WEP (EAP-MD5). The IEEE 802.1X functionality is enabled
and the user-name/password-based EAP-MD5 authentication is used. Data encryption is
achieved by static WEP.
y
IEEE 802.1X EAP with Dynamic WEP (EAP-TLS, EAP-TTLS, PEAP). The IEEE 802.1X
functionality is enabled and dynamic WEP key distribution authentication (EAP-TLS,
EAP-TTLS, or PEAP) is used. Data encryption is achieved by dynamic WEP.
y
IEEE 802.1X EAP with Dynamic TKIP (WPA). This is a full WPA mode, in which both the
TKIP and IEEE 802.1X dynamic key exchange mechanisms are enabled. The AP is highly
secure in this mode.
3-17
Komentarze do niniejszej Instrukcji