NetComm HS960 Network Router User Manual


 
HS960 Wireless Gateway User Guide YML857 Rev1
100 www.netcomm.com.au
Item Default Description
Beacon Interval
200
This valid value range is 1 to 1000 and indicates the frequency interval of
the beacon.
RTS Threshold
2347 This
valid
value range is 256-2342. This setting determines the packet size at
which the HS960 issues a request to send (RTS) before sending the packet. A
low RTS Threshold setting can be useful in areas where many client devices
are associating with the HS960 , or in areas where the clients are far apart and
can detect only the HS960 and not each other.
Fragmentation
Threshold
2432 This setting determines the size at which packets are fragmented. Enter a
setting ranging from 256 to 2432 bytes. Use a low setting in areas where
communication is poor or where there is a great deal of radio interference.
Preamble Type
Long Preamble The preamble type is a section of data at the head of a packet that contains
information the HS960 and client devices need when sending and receiving
packets. The setting menu allows you to select a long, short or dynamic
preamble type.
Authentication Method
Open System Select Open System, Shared Key or both.
Open System – Allows any device to authenticate and then attempt to
communicate with the HS960 . Using open authentication, any wireless device
can authenticate with the HS960, however the device can only communicate
if its WEP key matches the HS960. Devices not using WEP do not attempt to
authenticate with a Wireless Service Gateway that is using WEP.
Shared Key – During shared key authentication, the HS960 sends an
unencrypted challenge text string to any device attempting to communicate
with the HS960 . The device-requesting authentication encrypts the challenge
text and sends it back to the HS960 . If the challenge text is encrypted
correctly, the HS960 allows the requesting device to authenticate. Both
the unencrypted challenge and the encrypted challenge can be monitored,
however, which leaves the HS960 open to attack from an intruder who
calculates the WEP key by comparing the unencrypted and encrypted text
strings. Because of this weakness, shared key authentication can be less
secure than open authentication.
Both – With this setting wireless stations can communicate with or without
data encryption.