Important Note: If encryption of any kind, at any level is applied to the Router, all devices on the network must comply with all security measures.

802.1X

Some network-security experts now recommend that wireless networks use 802.1X security measures to overcome some weaknesses in standard WEP applications. A RADIUS server is used to authenticate all potential users.

Server IP Address: enter the IP address of the Radius server

Port: enter a port number, or accept the default

Secret: enter a password (1-63 character)

Group Key Interval: time (in seconds) after which the Group Key is changed automatically (1-99999).

Important Note: The values needed for the above entries can be obtained from your Internet Service Provider (ISP).

Figure 3-6. 802.1X configuration window

Important Note: If encryption of any kind, at any level is applied to the Router, all devices on the network must comply with all security measures.

23

Page 31
Image 31
D-Link DSL-G664T manual 802.1X, 1X configuration window