Moxa WAC-1001 [22/56] Wlan security settings

Moxa WAC-1001 [22/56] Wlan security settings
WAC-1001 Web Console Configureation
3-9
WLAN Security Settings
By enabling the 802.11X, you can use the Extensible Authentication Protocol (EAP), a framework
authentication protocol used by 802.1X, to provide network authentication. Such enterprise-level security
modes require a back-end Remote Authentication Dial-In User Service (RADIUS) server if IEEE 802.1X
functionality is enabled in WPA/WPA2. The IEEE 802.1X protocol also provides the ability possibility to carry out
efficient connection authentication for a large-scale network. It is not necessary to exchange keys or
passphrases.
When you enable EAP, the WPA/WPA2-enterprise wireless security functions of the managed APs will be
disabled. The WAC-1001 will then act as an EAP proxy or relay to support WAP/WPA2-enterprise wireless
security.
802.1X/ EAP
Setting Description Factory Default
Enable/Disable Enables EAP proxy/relay support. The wireless security
functions of the managed APs will be disabled.
Disable
Primary/ Secondary RADIUS server IP
Setting Description Factory Default
The IP address of the
RADIUS server
Specifies the delegated RADIUS server for EAP None
Primary/ Secondary RADIUS server port
Setting Description Factory Default
Port number Specifies the port number of the delegated RADIUS server 1812
Primary/ Secondary RADIUS shared key
Setting Description Factory Default
Max. 31 characters The secret key shared between the AP and RADIUS server None
NOTE
The wireless security settings of all the APs that are deployed in the same
roaming domain
must be consistent
and homogeneous. Different security settings in same
-grouped APs may cause Turbo Roaming
failures. Refer
to the
AWK-3121/4121-RS manual for detailed information about the Wireless Setting.

Содержание

Скачать