Cisco Small Business RV 120W Wireless-N VPN Firewall ...
Cisco Small Business RV 120W Wireless-N VPN Firewall ... Cisco Small Business RV 120W Wireless-N VPN Firewall ...
Configuring the Wireless NetworkConfiguring Basic Wireless Settings3personal authentication is the preshared key (PSK) that is an alphanumericpassphrase shared with the wireless peer.• WPA Enterprise—Allows you to use WPA with RADIUS serverauthentication.• WPA2 Personal—WPA2 is the implementation of security standardspecified in the final 802.11i standard. It supports AES encryption and thisoption uses preshared key (PSK) based authentication.• WPA2 Personal Mixed—Allows both WPA and WPA2 clients to connectsimultaneously using PSK authentication.• WPA2 Enterprise—Allows you to use WPA2 with RADIUS serverauthentication.• WPA2 Enterprise Mixed—Allows both WPA and WPA2 clients to connectsimultaneously using RADIUS authentication.The Encryption Type appears based on the type of network you chose in Step 3:• WPA Personal, WPA Enterprise, WPA2 Personal Mixed, WPA2 EnterpriseMixed—TKIP+AES• WPA2 Personal, WPA2 Enterprise—AESSTEP 7If you chose WEP:a. In the Authentication field, choose Open System or Shared Key. If you chooseOpen System, a wireless client doesn't need to provide a shared key in order toaccess the wireless network. Any client can associate to the router. If youchoose Shared Key, a wireless client must provide the correct shared key(password) in order to access the wireless network.b. Select the Encryption Type (64- or 128-bit WEP). The larger size keys providestronger encryption, making the key more difficult to crack (for example, 64-bitWEP has a 40-bit key which is less secure than the 128-bit WEP, which has a104-bit key).c. (Optional) In the WEP Passphrase field, enter an alphanumeric phrase (longerthan eight characters for optimal security) and click Generate Key to generatefour unique WEP keys in the WEP Key fields below.d. Select one of the four keys to use as the shared key that devices must have inorder to use the wireless network. If you did not generate a key in Step 7c,enter a key directly into the WEP Key field. The length of the key should be 5ASCII characters (or 10 hexadecimal characters) for 64-bit WEP and 13 ASCIICisco RV120W Administration Guide 57
Configuring the Wireless NetworkConfiguring Basic Wireless Settings3characters (or 26 hexadecimal characters) for 128-bit WEP. Valid hexadecimalcharacters are “0” to “9” and “A” to “F”.If you chose WPA Personal, WPA2 Personal, or WPA2 Personal Mixed:a. Enter the WPA Key, or password/phrase that will secure the network. Devicesconnecting to the network must use this phrase for authentication.b. If you want to see the password as you are entering it, check the UnmaskPassword box.c. In the Key Renewal field, enter the number of seconds after which the CiscoRV120W will generate a new key. These keys are internal keys exchangedbetween the Cisco RV120W and connected devices. The default value (3600seconds) is usually adequate unless you are experiencing network problems.If you chose WPA Enterprise or WPA2 Enterprise Mixed, no further configuration isrequired.If you chose WPA2 Enterprise, you can check the Pre-Authentication box(optional). Pre-authentication allows wireless clients to quickly switch betweenconnected wireless networks sharing the same security configuration. When awireless client disconnects from a wireless network, a notification is sent to thenetwork, which then sends the pre-authentication info to other wireless networks.STEP 8Click Save.Configuring MAC FilteringYou can use MAC filtering to permit or deny access to the wireless network basedon the MAC (hardware) address of the requesting device. For example, you canenter the MAC addresses of a set of PCs and only allow those PCs to access thenetwork. MAC filtering is configured for each wireless network.STEP 1STEP 2STEP 3STEP 4Choose Wireless > Basic Settings.In the Wireless Basic Settings Table, check the box on the left of the wirelessnetwork you want to configure.Click Edit MAC Filtering.Choose Enable.Cisco RV120W Administration Guide 58
- Page 16 and 17: IntroductionMounting the Cisco RV12
- Page 18 and 19: IntroductionConnecting the Equipmen
- Page 20 and 21: IntroductionConnecting the Equipmen
- Page 22 and 23: IntroductionUsing the Getting Start
- Page 24 and 25: IntroductionNavigating through the
- Page 26 and 27: IntroductionSaving Your Changes1Sav
- Page 28 and 29: 2Configuring NetworkingThe networki
- Page 30 and 31: Configuring NetworkingConfiguring t
- Page 32 and 33: Configuring NetworkingConfiguring t
- Page 34 and 35: Configuring NetworkingConfiguring t
- Page 36 and 37: Configuring NetworkingConfiguring t
- Page 38 and 39: Configuring NetworkingConfiguring t
- Page 40 and 41: Configuring NetworkingConfiguring t
- Page 42 and 43: Configuring NetworkingConfiguring t
- Page 44 and 45: Configuring NetworkingConfiguring R
- Page 47 and 48: Configuring NetworkingConfiguring R
- Page 49 and 50: Configuring NetworkingConfiguring P
- Page 51 and 52: Configuring NetworkingConfiguring I
- Page 55 and 56: Configuring NetworkingConfiguring I
- Page 57 and 58: Configuring NetworkingConfiguring I
- Page 59 and 60: Configuring NetworkingConfiguring I
- Page 61 and 62: Configuring the Wireless NetworkA N
- Page 63 and 64: Configuring the Wireless NetworkUnd
- Page 65: Configuring the Wireless NetworkCon
- Page 69 and 70: Configuring the Wireless NetworkCon
- Page 71 and 72: Configuring the Wireless NetworkCon
- Page 73 and 74: Configuring the Wireless NetworkCon
- Page 75 and 76: Configuring the FirewallCisco RV120
- Page 77 and 78: Configuring the FirewallConfiguring
- Page 79 and 80: Configuring the FirewallConfiguring
- Page 81 and 82: Configuring the FirewallConfiguring
- Page 83 and 84: Configuring the FirewallConfiguring
- Page 85 and 86: Configuring the FirewallConfiguring
- Page 87 and 88: Configuring the FirewallConfiguring
- Page 89 and 90: Configuring the FirewallConfiguring
- Page 91 and 92: Configuring the FirewallConfiguring
- Page 93 and 94: Configuring the FirewallConfiguring
- Page 95 and 96: Configuring the FirewallConfiguring
- Page 97 and 98: Configuring the FirewallFirewall Co
- Page 99 and 100: Configuring the FirewallFirewall Co
- Page 101 and 102: 5Configuring Virtual Private Networ
- Page 103 and 104: Configuring Virtual Private Network
- Page 105 and 106: Configuring Virtual Private Network
- Page 107 and 108: Configuring Virtual Private Network
- Page 109 and 110: Configuring Virtual Private Network
- Page 111 and 112: Configuring Virtual Private Network
- Page 113 and 114: Configuring Virtual Private Network
- Page 115 and 116: Configuring Virtual Private Network
Configuring the <strong>Wireless</strong> NetworkConfiguring Basic <strong>Wireless</strong> Settings3personal authentication is the preshared key (PSK) that is an alphanumericpassphrase shared with the wireless peer.• WPA Enterprise—Allows you to use WPA with RADIUS serverauthentication.• WPA2 Personal—WPA2 is the implementation of security standardspecified in the final 802.11i standard. It supports AES encryption and thisoption uses preshared key (PSK) based authentication.• WPA2 Personal Mixed—Allows both WPA and WPA2 clients to connectsimultaneously using PSK authentication.• WPA2 Enterprise—Allows you to use WPA2 with RADIUS serverauthentication.• WPA2 Enterprise Mixed—Allows both WPA and WPA2 clients to connectsimultaneously using RADIUS authentication.The Encryption Type appears based on the type of network you chose in Step 3:• WPA Personal, WPA Enterprise, WPA2 Personal Mixed, WPA2 EnterpriseMixed—TKIP+AES• WPA2 Personal, WPA2 Enterprise—AESSTEP 7If you chose WEP:a. In the Authentication field, choose Open System or Shared Key. If you chooseOpen System, a wireless client doesn't need to provide a shared key in order toaccess the wireless network. Any client can associate to the router. If youchoose Shared Key, a wireless client must provide the correct shared key(password) in order to access the wireless network.b. Select the Encryption Type (64- or 128-bit WEP). The larger size keys providestronger encryption, making the key more difficult to crack (for example, 64-bitWEP has a 40-bit key which is less secure than the 128-bit WEP, which has a104-bit key).c. (Optional) In the WEP Passphrase field, enter an alphanumeric phrase (longerthan eight characters for optimal security) and click Generate Key to generatefour unique WEP keys in the WEP Key fields below.d. Select one of the four keys to use as the shared key that devices must have inorder to use the wireless network. If you did not generate a key in Step 7c,enter a key directly into the WEP Key field. The length of the key should be 5ASCII characters (or 10 hexadecimal characters) for 64-bit WEP and 13 ASCII<strong>Cisco</strong> <strong>RV</strong><strong>120W</strong> Administration Guide 57