Side Ads

Sunday, July 19, 2015

Filled Under: ,

Motorola NVG589 Residential Gateway Wireless and Security Options

When the Wireless link on the Motorola NVG589 Residential Gateway RG (RG) interface is selected, the Wireless page appears. The Wireless page displays the status of the Motorola NVG589 wireless LAN elements. [Wireless General User Interface - Screenshot]
The center section of the Wireless page contains a summary of the wireless access point's (WAP) configuration settings and operational status. [Summary Information WAP - Screenshot]

The table below provides a description for each field:

FieldDescription
Network Name (SSID)
A preset number unique to the unit. Either leave it as-is or change it by entering a freeform name of up to 32 characters.
Example: Hercule's Wireless LAN
On client PC software, this might also be called the Network Name. The Wireless ID is used to identify this particular wireless LAN. Depending on their operating system or client wireless card, the customer must either:
  • Select from a list of available wireless LANs that appear in a scanned list on their PC (client).
  • Enter the name on their client in order to join the wireless LAN.
Hide SSID
  • If enabled, this mode hides the wireless network from the scanning features of the wireless client computers. 
  • Unless both the wireless clients and the RG share the same network name (SSID) in hidden mode, the RG's wireless LAN does not appear as an available network when scanned for by wireless-enabled computers. 
  • Members of the hidden WLAN must log onto the RG's wireless network with the identical SSID as that configured in the RG. 
  • Closed System mode is an ideal way to increase wireless security and to prevent casual detection by unwanted neighbors, office users, or malicious users such as hackers. 
  • If Hide SSID is not enabled, it is more convenient, but potentially less secure for clients accessing the WLAN by scanning available access points. Customers must decide based on their own network requirements.
Security, WPA Version, and WEP Key LengthSee Wireless Security for details.
Mode
  • The pull-down menu allows customers to select and lock the RG into the wireless transmission mode they want: B/G/NB-onlyB/GG-only, or N-only.
  • For compatibility with clients using 802.11b (up to 11Mbps transmission), 802.11g (up to 20+ Mbps), 802.11a (up to 54Mbits using the 5GHz band), or 802.11n (from 54Mbits to 600Mbits with the use of four spatial streams at a channel width of 40MHz), select B/G/N
  • To limit the wireless LAN to one mode or the other, select G-onlyN-only, or B-only, or some combination that applies.
Bandwidth
  • Can only be selected if mode is in some combination of 802.11n (from 54Mbits to 600Mbits with the use of four spatial streams at a channel width of 40MHz). 
  • Measure of the width of a range of frequencies, in megahertz.
Channel
  • The network broadcasts on channels 1-11 for North America. 
  • This is a frequency range is within the 2.4Ghz band. 
  • Channel selection depends on government regulated radio frequencies that vary from region-to-region. 
  • Channel selection can have a significant impact on performance, depending on other wireless activity close to this WAP.
  • Do not select a channel at any of the computers on the wireless network. They automatically scan available channels seeking an RG broadcasting on the SSID for which they are configured.
  • The Automatic setting allows the WAP to determine the best channel to broadcast automatically.
Power Level
  • Sets the wireless transmit power - Scales down the WAP's wireless-transmission coverage by lowering its radio power output.
  • Default is 100% power. 
  • Transmit power settings are useful in large venues with multiple wireless routers where customers want to reuse channels. Since there are only three non-overlapping channels in the 802.11 spectrum, it helps to size the WAP's cell to match the location. This allows customers to install a router to cover a small "hole" without conflicting with other routers nearby.
Wireless Protected Setup (WPS)
  • An easier way to use existing protocols to provide greater security for your wireless network connections. 
  • By default, Privacy is set to Wireless Protected Access (WPA-PSK). 
  • WPS allows customers to automatically generate a new strong WPA key for their RG and any client devices on their wireless network. 
    • Not all client wireless devices support WPS. 
    • The customer should refer to their documentation and then enter all the digits for the WPS PIN and click Submit
  • By default, Wireless Security is set to WPA-PSK with a pre-defined WPA-default key (WPA Pre-Shared Key).

Wireless Security
Other options are also available from the Security pull-down menu: [Wireless General User Interface Options - Screenshot]
FeatureDescription
WEP - Manual
  • WEP (Wired Equivalent Privacy) Security is a privacy option that is based on encryption between the router and any clients with wireless cards. 
  • If not using WPA-PSK Privacy, use WEP-encryption instead. 
    • For this encryption to work, both the WAP and each client must share the same wireless ID (SSID) and both must be using the same encryption keys.
  • WEP provides a level of data security by enabling encryption of network data. 
  • Customers can enable 40-bit or 128-bit WEP encryption (depending on the capability of their client wireless card) for IP traffic on the LAN.
  • Customers can enter their own encryption keys manually. This is a difficult process, but only needs to be done once. 
    • Customers should avoid the temptation to enter all the same characters.
WPA - PSK
  • Allows customers to enter their own key, the most secure option for their wireless network. The key can be between 8-63 characters, but for best security it should be at least 20 characters.
  • If WPA-PSK is selected as the privacy setting, the WPA Version pull-down menu allows customers to select the WPA version(s) that is required for client connections. Choices are: 
    • Both - For maximum interoperability
    • WPA-1 - For backward compatibility
    • WPA-2 - For maximum security
  • All clients must support the version(s) selected in order to successfully connect
  • Verify that the Wi-Fi client adapter supports this option. Not all Wi-Fi clients support WPA-PSK.
OFF - No Privacy
  • This mode disables privacy on the network, allowing any wireless users to connect to the wireless LAN. 
  • Use this option if using alternative security measures such as VPN tunnels, or if the network is for public use.
Key Length
  • The pull-down menu selects the length of each encryption key. 
  • The longer the key, the stronger the encryption and the more difficult it is to break the encryption. 
  • Enter a key using hexadecimal digits. For 40/64-bit encryption, use 10 digits; 26 digits for 128-bit WEP. Hexadecimal characters are 0–9, and a–f.
    Examples:
    • 40 bits: 02468ACE02
    • 128 bits: 0123456789ABCDEF0123456789
  • Any WEP-enabled client must have an identical key of the same length as the router, in order to successfully receive and decrypt the traffic. Similarly, the client also has a default key that it uses to encrypt its transmissions. 
    • In order for the router to receive the client's data, it must likewise have the identical key of the same length.

Advanced Firewall Configuration
The Motorola NVG589 Firewall Monitoring software and service is not offered by AT&T. If the customer requires Advanced Firewall Configuration, refer the customer to ConnecTech using WFE.

0 comments:

Post a Comment