EasyManua.ls Logo

Check Point UTM-1 Edge - Page 301

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Wireless Networks
Chapter 10: Working with Wireless Networks 287
In this field… Do this…
Security Select the security protocol to use. For information on the supported
security protocols, see Wireless Security Protocols on page
270.
If you select WEP encryption, the WEP Keys area opens.
If you select WPA-Enterprise, the Require WPA2 (802.11i) and WPA Encryption
fields appear.
If you select WPA-Personal, the Passphrase, Require WPA2 (802.11i), and WPA
Encryption fields appear.
Note: When configuring a WDS link, only None and WEP are not supported.
Passphrase
Type the passphrase for accessing the network, or click Random to randomly
generate a passphrase.
This must be between 8 and 63 characters. It can contain spaces and
special characters, and is case-sensitive.
For the highest security, choose a long passphrase that is hard to guess, or
use the Random button.
Note: The wireless stations must be configured with this passphrase as well.
Require WPA2
(802.11i)
Specify whether you want to require wireless stations to connect using
WPA2, by selecting one of the following:
Enabled. Only wireless stations using WPA2 can access the
wireless network.
Disabled. Wireless stations using either WPA or WPA2 can
access the wireless network. This is the default.

Table of Contents

Related product manuals