Wireless Access Point Model | User Manual | Page 25 of 33 | |
|
|
|
|
|
|
|
|
Figure 20 - WEP Key Entry Sub-Screen
Note that the identical key must be used at all the clients and at the access point, otherwise authentication will not be possible. Keys should be changed frequently for maximum security.
802.1X
The access point can be configured to enable clients to authenticate against external RADIUS servers using the IEEE802.1x standard. This method is best suited to corporate users where high security is required. The 802.1x standard uses the common existing protocol, the Extensible Authentication Protocol (EAP) for message exchange during the authentication process. The implementation of 802.1x protocol is quite complex and needs detailed awareness of IP and security
In a wireless LAN with 802.1x enabled, a client requests access to an access point (known as the authenticator). The access point forces the client into an unauthorized state that allows the client to send only an
The access point hides the complexity of the IEEE802.1x registration process as it transparently handles the main authentication types including
Figure 21 - 802.1x Authentication Sub-Screen
Re-authentication Time
This value is the duration that runs before the client needs to be authenticated against the RADIUS server.
Primary Radius Server – Authentication Server IP
This is the IP address of the primary RADIUS server. The default TCP port value is 1812. If there is a shared secret for the transactions, then enter the value in the Shared Secret box.
PL0356 | ©2003TycoElectronics | Issue 1 |