
Prestige 2602HW Series User’s Guide
2The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly.
3The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the
Figure 28 WPA with RADIUS Application Example
6.10 Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. You enter manual keys by first selecting
Table 16 Wireless Security Relational Matrix
AUTHENTICATION | ENCRYPTION | ENTER | ENABLE IEEE 802.1X | |
METHOD/ KEY | ||||
METHOD | MANUAL KEY | |||
MANAGEMENT PROTOCOL |
| |||
|
|
|
| |
Open | None | No | No | |
|
|
|
| |
Open | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
| |
Shared | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
|
98 | Chapter 6 Wireless LAN Setup |