Meshtray Security Tab; Allow Open Authentication - Motorola WMC6300 User Manual

3.1 wireless modem card
Hide thumbs Also See for WMC6300:
Table of Contents

Advertisement

MEA
This scheme requires that the host be configured to request an address from a DHCP server
but does not require a DHCP server on the core network.
It should be noted that a DHCP server can still exist on the network to hand out addresses to
other nodes using the Network DHCP Scheme as long as the server's address range does not
conflict with addresses assigned to devices using the Statically Provisioned or User Supplied
Schemes.
The granted IP addresses granted by the server and options are configurable per-device using
MeshManager. The internally generated DHCP messages will assign the host a static lease to
the provisioned address, which may be freely used to communicate while associated or
unassociated.
The operator must ensure that the provisioned addresses are routable and do not conflict with
any other addresses in use. The operator is free to provision any option ordinarily provisioned
by a DHCP server (subnet mask, DNS, etc.) through programming of the appropriate fields in
each device using MeshManager.
This scheme is ideal for a managed network of users who regularly need to communicate inside
and outside of network coverage or for a network lacking a DHCP server.
User Supplied Scheme
Operating under the User Supplied scheme, the user's host device is configured to use a fixed
IP address and subnet mask.
otherwise be configured by a DHCP server.
Furthermore, it is up to the user to ensure that the assigned address is routable on the core
network (if core network access is needed) and that it does not conflict with other addresses in
use. This is analogous to and carries the same caveats as plugging an Ethernet card into a
LAN and manually
assigning it an address.
The user is free to communicate while associated or unassociated. This scheme is ideal for
small, unmanaged networks lacking a DHCP server.
All of these schemes may be assigned per device, either by the user or by the network
manager. The network manager can also limit the user-selectable schemes or force a specific
scheme. Devices in each of these schemes can interoperate and communicate with each other,
so long as the assigned addresses do not conflict and are mutually routable.

MeshTray Security Tab

Allow Open Authentication

Open Authentication allows authentication of any device currently being monitored and
authentication of devices added to the network configuration as they are discovered.
When in peer-to-peer mode, click on one of the radio buttons to select the desired
authentication option.
Local
Force
Authorized
The user is responsible for configuring options that would
Authentication is based on Peer information. (see Peer Authentication).
Allow all clients.
WMC6300 Pocket PC Users Guide
19

Advertisement

Table of Contents
loading

Table of Contents