Prestige 2602HW Series User’s Guide

Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol

LABEL

DESCRIPTION

 

 

Wireless Port

To control wireless stations access to the wired network, select a control method

Control

from the drop-down list box. Choose from No Authentication Required,

 

Authentication Required and No Access Allowed.

 

The following fields are only available when you select Authentication Required.

 

 

ReAuthentication

Specify how often wireless stations have to reenter usernames and passwords in

Timer

order to stay connected. This field is activated only when you select

(in Seconds)

Authentication Required in the Wireless Port Control field.

 

Enter a time interval between 10 and 9999 seconds. The default time interval is

 

1800 seconds (30 minutes).

 

Note: If wireless station authentication is done using a RADIUS

 

server, the reauthentication timer on the RADIUS server has

 

priority.

Idle Timeout

The Prestige automatically disconnects a wireless station from the wired network

(in Seconds)

after a period of inactivity. The wireless station needs to enter the username and

password again before access to the wired network is allowed.

 

 

This field is activated only when you select Authentication Required in the

 

Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour).

Key Management

Choose 802.1x from the drop-down list.

Protocol

 

Dynamic WEP Key

This field is activated only when you select Authentication Required in the

Exchange

Wireless Port Control field. Also set the Authentication Databases field to

 

RADIUS Only. Local user database may not be used.

 

Select Disable to allow wireless stations to communicate with the access points

 

without using dynamic WEP key exchange.

 

Select 64-bit WEP or 128-bit WEP to enable data encryption.

 

Up to 32 stations can access the Prestige when you configure dynamic WEP key

 

exchange.

 

This field is not available when you set Key Management Protocol to WPA or

 

WPA-PSK.

Authentication

The authentication database contains wireless station login information. The local

Databases

user database is the built-in database on the Prestige. The RADIUS is an external

 

server. Use this drop-down list box to select which database the Prestige should

 

use (first) to authenticate a wireless station.

 

Before you specify the priority, make sure you have set up the corresponding

 

database correctly first.

 

Select Local User Database Only to have the Prestige just check the built-in user

 

database on the Prestige for a wireless station's username and password.

 

Select RADIUS Only to have the Prestige just check the user database on the

 

specified RADIUS server for a wireless station's username and password.

 

Select Local first, then RADIUS to have the Prestige first check the user

 

database on the Prestige for a wireless station's username and password. If the

 

user name is not found, the Prestige then checks the user database on the

 

specified RADIUS server.

 

Select RADIUS first, then Local to have the Prestige first check the user

 

database on the specified RADIUS server for a wireless station's username and

 

password. If the Prestige cannot reach the RADIUS server, the Prestige then

 

checks the local user database on the Prestige. When the user name is not found

 

or password does not match in the RADIUS server, the Prestige will not check the

 

local user database and the authentication fails.

Chapter 6 Wireless LAN Setup

101