Prestige 2602H/HW Series User’s Guide
CHAPTER 5
Wireless LAN (P2602HW Models)
This chapter discusses how to configure Wireless LAN.
5.1 Introduction
A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a
Note: See the WLAN appendix for more detailed information on WLANs.
5.2 Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless stations, access points and the wired network.
Wireless security methods available on the Prestige are data encryption, wireless client authentication, restricting access by device MAC address and hiding the Prestige identity.
5.2.1Encryption
•Use WPA security if you have
•Use
•If you don’t have
5.2.2Authentication
WPA has user authentication and you can also configure IEEE 802.1x to use the
•Use RADIUS authentication if you have a RADIUS server. See the appendices for information on protocols used when a client authenticates with a RADIUS server via the Prestige.
Chapter 5 Wireless LAN (P2602HW Models) | 91 |