Configuring the Wireless Network
Configuring Wireless Profiles
Cisco RV 120W Administration Guide 64
3
• WPA Enterprise—Allows you to use WPA with RADIUS server
authentication.
• WPA2 Personal—WPA2 is the implementation of security standard
specified in the final 802.11i standard. It supports AES encryption and this
option uses preshared key (PSK) based authentication.
• WPA2 Personal Mixed—Allows both WPA and WPA2 clients to connect
simultaneously using PSK authentication.
• WPA2 Enterprise—Allows you to use WPA2 with RADIUS server
authentication.
• WPA2 Enterprise Mixed—Allows both WPA and WPA2 clients to connect
simultaneously using RADIUS authentication.
STEP 7 Perform the following steps based on the type of encryption you chose in Step 6:
WPA/WPA2
a. Select the encryption method to be used: TKIP, AES, or TKIP+AES.
b. Select the authentication method to be used: RADIUS, PSK, or PSK + RADIUS.
c. WPA Password—Enter the pre-shared key for WPA/WPA2 PSK authentication.
The clients also need to be configured with the same password.
d. (Optional) Check the Enable Pre-Authentication box to enable pre-
authentication for this profile. Pre-authentication allows wireless clients to
quickly switch between connected Access Points sharing the same security
configuration. This is mainly used when APs are configured with WPA/WPA2
security. In event of wireless client disconnecting from an AP, a notification is
sent to the AP, which then sends the pre-authentication info to other APs in the
network.
WEP
In the WEP Index and Keys section:
a. In the Authentication field, choose Open System or Shared Key. If you choose
open system, a wireless client doesn't need to provide a shared key in order to
access the wireless network. Any client can associate to the router. If you
choose shared key, a wireless client must provide the correct shared key
(password) in order to access the wireless network.
b. Select the encryption type (64- or 128-bit). The larger size keys provide
stronger encryption, making the key more difficult to crack (for example, 64-bit