D-Link dap-2310 Network Router User Manual


 
5D-Link DAP-2310 User Manual
Section 1 - Product Overview
Introduction
The DAP-2310 802.11n AP increases productivity by allowing you to work faster and more eciently. With the DAP-2310,
bandwidth-intensive applications like graphics or multimedia will benet signicantly because large les are now able to move
across the network quickly.
The DAP-2310 is capable of operating in one of four dierent wireless networking modes: Access Point, WDS (Wireless Distribution
System) with AP, WDS, or Wireless Client mode.
An ideal solution for quickly creating and extending a wireless local area network (WLAN) in oces or other workplaces, trade
shows, and special events, the DAP-2310 provides data transfer rates up to 300Mbps. (The 802.11n standard is backwards
compatible with 802.11g and 802.11b devices.)
WPA/WPA2 is oered in two options: Enterprise (used for corporations) and Personal (used for home users).
WPA-Personal and WPA2-Personal are directed towards home users who do not have the server-based equipment required
for user authentication. This method of authentication is similar to WEP because you dene a “Pre-Shared Key” on the wireless
router/AP. Once the pre-shared key is conrmed and satised at both the client and access point, access is then granted. The
encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP), which oers per-packet dynamic hashing. It
also includes an integrity checking feature which ensures that the packets were not tampered with during wireless transmission.
WPA-Enterprise and WPA2-Enterprise are ideal for businesses that already have existing security infrastructures established.
Management and security implementation can now be centralized on a server participating on the network. Utilizing 802.1X
with a RADIUS (Remote Authentication Dial-in User Service) server, a network administrator can dene a list of authorized
users who can access the wireless LAN. When attempting to access a wireless LAN with WPA-Enterprise congured, the new
client will be requested to enter a username with a password. If the new client is authorized by the administration, and enters
the correct username and password, then access is granted. In the case where an employee leaves the company, the network
administrator is able to remove the previous employee from the authorized list to avoid compromising the network.