- Fortress Wireless Access Bridge User Guide

Fortress Bridge: Administration
53
authenticate on the network. (Refer to Section 3.6.6.5 for
detailed instructions.)
If a device exceeds the maximum allowable retry attempts to
connect to the Bridge-secured network, that device will be
locked out until the device’s
State is set to Allow. Such a device
is locked out on every Bridge in a point-to-multipoint network,
and you must change the device’s
State setting on every Bridge
that handles traffic from the device.
4.1.1 Default Device Authentication Settings
As devices auto-populate the DEVICE AUTHENTICATION screen,
they are permitted or denied immediate access to the network
based on the default
Device State setting, located in the
AUTHENTICATION SETTINGS frame of the SECURITY SETTINGS
screen (under
AUTHENTICATION DEFAULTS).
NOTE: Refer to
Section 3.6.6.8 for
detailed instructions on
configuring the default
device state and user
authentication option
settings for new devices.
Another default setting in the AUTHENTICATION SETTINGS frame
determines whether user authentication is included by default
for devices auto-populating the
DEVICE AUTHENTICATION screen.
Whatever default settings you choose for authenticating
devices, you can change the initial
Device State and
AUTHENTICATION OPTIONS settings individually for any device on
the
DEVICE AUTHENTICATION screen.
4.1.2 Individual Device Authentication Settings
Devices will auto-populate the DEVICE AUTHENTICATION screen
only when device authentication is enabled in the
AUTHENTICATION SETTINGS frame of the SECURITY SETTINGS
screen (refer to Section 3.6.6, Non-802.1X Authentication
Global and Default Settings).
The Fortress Bridge tracks and manages access for devices on
the Fortress-secured network through two identifiers, which are
not user-configurable:
Device ID - a unique, 16-digit hexadecimal identifier
generated for the device and used to authenticate it on the
network
Device MAC - the device’s MAC address