Prestige 2602HW Series User’s Guide
Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol
LABEL | DESCRIPTION |
|
|
Wireless Port | To control wireless stations access to the wired network, select a control method |
Control | from the |
| Authentication Required and No Access Allowed. |
| The following fields are only available when you select Authentication Required. |
|
|
ReAuthentication | Specify how often wireless stations have to reenter usernames and passwords in |
Timer | order to stay connected. This field is activated only when you select |
(in Seconds) | Authentication Required in the Wireless Port Control field. |
| Enter a time interval between 10 and 9999 seconds. The default time interval is |
| 1800 seconds (30 minutes). |
| Note: If wireless station authentication is done using a RADIUS | |
| server, the reauthentication timer on the RADIUS server has | |
| priority. | |
Idle Timeout | The Prestige automatically disconnects a wireless station from the wired network | |
(in Seconds) | after a period of inactivity. The wireless station needs to enter the username and | |
password again before access to the wired network is allowed. | ||
| ||
| This field is activated only when you select Authentication Required in the | |
| Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour). | |
Key Management | Choose 802.1x from the | |
Protocol |
| |
Dynamic WEP Key | This field is activated only when you select Authentication Required in the | |
Exchange | Wireless Port Control field. Also set the Authentication Databases field to | |
| RADIUS Only. Local user database may not be used. | |
| Select Disable to allow wireless stations to communicate with the access points | |
| without using dynamic WEP key exchange. | |
| Select | |
| Up to 32 stations can access the Prestige when you configure dynamic WEP key | |
| exchange. | |
| This field is not available when you set Key Management Protocol to WPA or | |
| ||
Authentication | The authentication database contains wireless station login information. The local | |
Databases | user database is the | |
| server. Use this | |
| use (first) to authenticate a wireless station. | |
| Before you specify the priority, make sure you have set up the corresponding | |
| database correctly first. | |
| Select Local User Database Only to have the Prestige just check the | |
| database on the Prestige for a wireless station's username and password. | |
| Select RADIUS Only to have the Prestige just check the user database on the | |
| specified RADIUS server for a wireless station's username and password. | |
| Select Local first, then RADIUS to have the Prestige first check the user | |
| database on the Prestige for a wireless station's username and password. If the | |
| user name is not found, the Prestige then checks the user database on the | |
| specified RADIUS server. | |
| Select RADIUS first, then Local to have the Prestige first check the user | |
| database on the specified RADIUS server for a wireless station's username and | |
| password. If the Prestige cannot reach the RADIUS server, the Prestige then | |
| checks the local user database on the Prestige. When the user name is not found | |
| or password does not match in the RADIUS server, the Prestige will not check the | |
| local user database and the authentication fails. |
Chapter 6 Wireless LAN Setup | 101 |