
Chapter 5 Wireless LAN
Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key.
5.2.4Additional Installation Requirements for Using 802.1x
•A computer with an IEEE 802.11 compatible wireless LAN card.
•A computer equipped with a web browser (with JavaScript enabled) and/or Telnet.
•A wireless station must be running IEEE
•An optional network RADIUS server for remote user authentication and accounting.
5.3 Introduction to RADIUS
The
•Authentication
Determines the identity of the users.
•Accounting
Keeps track of the client’s network activity.
RADIUS user is a simple package exchange in which your
5.4 Configuring WLAN
Click WLAN to open the WLAN Configuration screen. Use this screen to configure the wireless settings, such as SSID, data rate or channel for each radio.
50 |
| |
| ||
|
|
|